Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Jens Frodesen CV.exe

Overview

General Information

Sample Name:Jens Frodesen CV.exe
Analysis ID:711362
MD5:89197e451346ed5a3ba154f394948de7
SHA1:0e9d39ec84881ca095a9c1400d64ec586e983402
SHA256:dbab1bf30e571bddf1c21a19bedebffd5a348145ea76abddc34a5172df49aa3b
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • Jens Frodesen CV.exe (PID: 2932 cmdline: "C:\Users\user\Desktop\Jens Frodesen CV.exe" MD5: 89197E451346ED5A3BA154F394948DE7)
    • schtasks.exe (PID: 5452 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmp476F.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • Jens Frodesen CV.exe (PID: 5344 cmdline: {path} MD5: 89197E451346ED5A3BA154F394948DE7)
      • schtasks.exe (PID: 4188 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp7194.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 2600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6072 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp75AC.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • Jens Frodesen CV.exe (PID: 244 cmdline: "C:\Users\user\Desktop\Jens Frodesen CV.exe" 0 MD5: 89197E451346ED5A3BA154F394948DE7)
    • schtasks.exe (PID: 5080 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmpBFFB.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5552 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 4320 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: 89197E451346ED5A3BA154F394948DE7)
    • schtasks.exe (PID: 5564 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmpC1DF.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 3104 cmdline: {path} MD5: 89197E451346ED5A3BA154F394948DE7)
  • dhcpmon.exe (PID: 988 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: 89197E451346ED5A3BA154F394948DE7)
    • schtasks.exe (PID: 5524 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmpE91E.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5628 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 5788 cmdline: {path} MD5: 89197E451346ED5A3BA154F394948DE7)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "fba1bbc6-2cc8-4c94-b6c0-dda5a12f", "Group": "Default", "Domain1": "brightnano1.ddns.net", "Domain2": "", "Port": 1989, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x2205:$x1: NanoCore.ClientPluginHost
  • 0x223e:$x2: IClientNetworkHost
00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x2205:$x2: NanoCore.ClientPluginHost
  • 0x2320:$s4: PipeCreated
  • 0x221f:$s5: IClientLoggingHost
00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x227f:$x2: NanoCore.ClientPlugin
  • 0x2205:$x3: NanoCore.ClientPluginHost
  • 0x2295:$i3: IClientNetwork
  • 0x221f:$i6: IClientLoggingHost
  • 0x223e:$i7: IClientNetworkHost
  • 0x1f9f:$s1: ClientPlugin
  • 0x2288:$s1: ClientPlugin
00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x2205:$a1: NanoCore.ClientPluginHost
  • 0x227f:$a2: NanoCore.ClientPlugin
  • 0x29a0:$b7: LogClientException
  • 0x221f:$b9: IClientLoggingHost
00000003.00000002.548893461.00000000070B0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x350b:$x1: NanoCore.ClientPluginHost
  • 0x3525:$x2: IClientNetworkHost
Click to see the 108 entries
SourceRuleDescriptionAuthorStrings
3.2.Jens Frodesen CV.exe.7080000.30.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x39eb:$x1: NanoCore.ClientPluginHost
  • 0x3a24:$x2: IClientNetworkHost
3.2.Jens Frodesen CV.exe.7080000.30.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x39eb:$x2: NanoCore.ClientPluginHost
  • 0x3b36:$s4: PipeCreated
  • 0x3a05:$s5: IClientLoggingHost
3.2.Jens Frodesen CV.exe.7080000.30.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x3a8b:$x2: NanoCore.ClientPlugin
  • 0x39eb:$x3: NanoCore.ClientPluginHost
  • 0x3aa1:$i3: IClientNetwork
  • 0x3a43:$i5: IClientDataHost
  • 0x3a05:$i6: IClientLoggingHost
  • 0x3a24:$i7: IClientNetworkHost
  • 0x426c:$i9: IClientNameObjectCollection
  • 0x3741:$s1: ClientPlugin
  • 0x3a94:$s1: ClientPlugin
  • 0x4680:$s2: EndPoint
  • 0x4371:$s3: IPAddress
  • 0x3c83:$s4: IPEndPoint
  • 0x43a3:$s7: get_Connected
3.2.Jens Frodesen CV.exe.7080000.30.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x39eb:$a1: NanoCore.ClientPluginHost
  • 0x3a8b:$a2: NanoCore.ClientPlugin
  • 0x47e1:$b7: LogClientException
  • 0x3a05:$b9: IClientLoggingHost
3.2.Jens Frodesen CV.exe.2c22150.0.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x8ba5:$x1: NanoCore.ClientPluginHost
  • 0x15d53:$x1: NanoCore.ClientPluginHost
  • 0x1fbe7:$x1: NanoCore.ClientPluginHost
  • 0x27b51:$x1: NanoCore.ClientPluginHost
  • 0x2db68:$x1: NanoCore.ClientPluginHost
  • 0x37617:$x1: NanoCore.ClientPluginHost
  • 0x41a87:$x1: NanoCore.ClientPluginHost
  • 0x4caad:$x1: NanoCore.ClientPluginHost
  • 0x58897:$x1: NanoCore.ClientPluginHost
  • 0x64656:$x1: NanoCore.ClientPluginHost
  • 0x8bd2:$x2: IClientNetworkHost
  • 0x15d8c:$x2: IClientNetworkHost
  • 0x1fc20:$x2: IClientNetworkHost
  • 0x27b8a:$x2: IClientNetworkHost
  • 0x37774:$x2: IClientNetworkHost
  • 0x41ac0:$x2: IClientNetworkHost
  • 0x4cac7:$x2: IClientNetworkHost
  • 0x588b1:$x2: IClientNetworkHost
  • 0x64693:$x2: IClientNetworkHost
Click to see the 283 entries

AV Detection

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Jens Frodesen CV.exe, ProcessId: 5344, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

E-Banking Fraud

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Jens Frodesen CV.exe, ProcessId: 5344, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Persistence and Installation Behavior

barindex
Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmp476F.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmp476F.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Jens Frodesen CV.exe" , ParentImage: C:\Users\user\Desktop\Jens Frodesen CV.exe, ParentProcessId: 2932, ParentProcessName: Jens Frodesen CV.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmp476F.tmp, ProcessId: 5452, ProcessName: schtasks.exe

Stealing of Sensitive Information

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Jens Frodesen CV.exe, ProcessId: 5344, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Remote Access Functionality

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Jens Frodesen CV.exe, ProcessId: 5344, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
Timestamp:192.168.2.7171.22.30.1704973019892816766 09/28/22-04:13:14.999476
SID:2816766
Source Port:49730
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.7171.22.30.1704971619892816766 09/28/22-04:12:02.248719
SID:2816766
Source Port:49716
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:171.22.30.170192.168.2.71989497292841753 09/28/22-04:13:08.192973
SID:2841753
Source Port:1989
Destination Port:49729
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:171.22.30.170192.168.2.71989497142841753 09/28/22-04:11:48.761471
SID:2841753
Source Port:1989
Destination Port:49714
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:171.22.30.170192.168.2.71989497322841753 09/28/22-04:13:50.237286
SID:2841753
Source Port:1989
Destination Port:49732
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.7171.22.30.1704971419892816766 09/28/22-04:11:48.872256
SID:2816766
Source Port:49714
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:171.22.30.170192.168.2.71989497312841753 09/28/22-04:13:20.783532
SID:2841753
Source Port:1989
Destination Port:49731
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.7171.22.30.1704971519892816766 09/28/22-04:11:55.135716
SID:2816766
Source Port:49715
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Jens Frodesen CV.exeReversingLabs: Detection: 60%
Source: Jens Frodesen CV.exeVirustotal: Detection: 56%Perma Link
Source: Jens Frodesen CV.exeMetadefender: Detection: 33%Perma Link
Source: brightnano1.ddns.netAvira URL Cloud: Label: malware
Source: brightnano1.ddns.netVirustotal: Detection: 13%Perma Link
Source: brightnano1.ddns.netVirustotal: Detection: 13%Perma Link
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 60%
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeVirustotal: Detection: 56%Perma Link
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMetadefender: Detection: 33%Perma Link
Source: C:\Users\user\AppData\Roaming\LrSEeB.exeReversingLabs: Detection: 60%
Source: C:\Users\user\AppData\Roaming\LrSEeB.exeMetadefender: Detection: 33%Perma Link
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.4015710.17.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Jens Frodesen CV.exe.4009ec0.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.6150000.26.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.3eafd3a.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.3eb9199.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Jens Frodesen CV.exe.4246338.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.6154629.25.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.6150000.26.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.4015710.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.40108da.16.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.4019d39.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Jens Frodesen CV.exe.4246338.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000000.278495402.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.544737083.0000000006150000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001C.00000002.405231773.0000000003391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.286466691.0000000003EF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001D.00000002.405844203.0000000003101000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.290258767.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: Jens Frodesen CV.exe PID: 2932, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Jens Frodesen CV.exe PID: 5344, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3104, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Jens Frodesen CV.exe PID: 4720, type: MEMORYSTR
Source: Jens Frodesen CV.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\LrSEeB.exeJoe Sandbox ML: detected
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
Source: 3.0.Jens Frodesen CV.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 3.2.Jens Frodesen CV.exe.6150000.26.unpackAvira: Label: TR/NanoCore.fadte
Source: 0000001C.00000002.405231773.0000000003391000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "fba1bbc6-2cc8-4c94-b6c0-dda5a12f", "Group": "Default", "Domain1": "brightnano1.ddns.net", "Domain2": "", "Port": 1989, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
Source: Jens Frodesen CV.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Jens Frodesen CV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.542986660.0000000005DC0000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.548343986.0000000007060000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.548537445.0000000007080000.00000004.08000000.00040000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.542908530.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.548413055.0000000007070000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_0654C088
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]3_2_0654FDD0
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]3_2_0654FE36
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]3_2_0654FDC1
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]3_2_0654FD88

Networking

barindex
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49714 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 171.22.30.170:1989 -> 192.168.2.7:49714
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49715 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49716 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 171.22.30.170:1989 -> 192.168.2.7:49729
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49730 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 171.22.30.170:1989 -> 192.168.2.7:49731
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 171.22.30.170:1989 -> 192.168.2.7:49732
Source: Malware configuration extractorURLs:
Source: Malware configuration extractorURLs: brightnano1.ddns.net
Source: unknownDNS query: name: brightnano1.ddns.net
Source: global trafficTCP traffic: 192.168.2.7:49714 -> 171.22.30.170:1989
Source: global trafficTCP traffic: 192.168.2.7:49718 -> 171.22.30.97:1989
Source: unknownTCP traffic detected without corresponding DNS query: 171.22.30.97
Source: unknownTCP traffic detected without corresponding DNS query: 171.22.30.97
Source: unknownTCP traffic detected without corresponding DNS query: 171.22.30.97
Source: unknownTCP traffic detected without corresponding DNS query: 171.22.30.97
Source: unknownTCP traffic detected without corresponding DNS query: 171.22.30.97
Source: unknownTCP traffic detected without corresponding DNS query: 171.22.30.97
Source: unknownTCP traffic detected without corresponding DNS query: 171.22.30.97
Source: unknownTCP traffic detected without corresponding DNS query: 171.22.30.97
Source: unknownTCP traffic detected without corresponding DNS query: 171.22.30.97
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.548413055.0000000007070000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://google.com
Source: Jens Frodesen CV.exe, 00000000.00000002.282970188.0000000002F2B000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 0000000C.00000002.370323682.0000000003421000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000E.00000002.364394906.000000000310B000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000014.00000002.398299174.00000000032C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000000.00000003.240997438.000000000123C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
Source: Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
Source: unknownDNS traffic detected: queries for: brightnano1.ddns.net
Source: dhcpmon.exe, 0000000E.00000002.358018633.0000000001538000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

E-Banking Fraud

barindex
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.4015710.17.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Jens Frodesen CV.exe.4009ec0.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.6150000.26.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.3eafd3a.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.3eb9199.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Jens Frodesen CV.exe.4246338.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.6154629.25.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.6150000.26.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.4015710.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.40108da.16.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.4019d39.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Jens Frodesen CV.exe.4246338.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000000.278495402.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.544737083.0000000006150000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001C.00000002.405231773.0000000003391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.286466691.0000000003EF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001D.00000002.405844203.0000000003101000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.290258767.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: Jens Frodesen CV.exe PID: 2932, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Jens Frodesen CV.exe PID: 5344, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3104, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Jens Frodesen CV.exe PID: 4720, type: MEMORYSTR

System Summary

barindex
Source: 3.2.Jens Frodesen CV.exe.7080000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.7080000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.7080000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.2c22150.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.2c22150.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.2c22150.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.Jens Frodesen CV.exe.2c22150.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.2c15ed4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.2c15ed4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.2c15ed4.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.Jens Frodesen CV.exe.2c15ed4.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.70c0000.35.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.70c0000.35.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.70c0000.35.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.3d9a5fd.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.3d9a5fd.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.3d9a5fd.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.4015710.17.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.4015710.17.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.4015710.17.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.5dd0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.5dd0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.5dd0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.5dc0000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.5dc0000.23.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.5dc0000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.5d70000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.5d70000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.5d70000.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.3f815e7.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.3f815e7.13.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.3f815e7.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.7070000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.7070000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.7070000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.70b0000.32.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.70b0000.32.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.70b0000.32.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.3f815e7.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.3f815e7.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.3f815e7.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.Jens Frodesen CV.exe.3f815e7.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.2e354cc.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.2e354cc.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.2e354cc.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.Jens Frodesen CV.exe.2e354cc.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.Jens Frodesen CV.exe.4009ec0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.Jens Frodesen CV.exe.4009ec0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.Jens Frodesen CV.exe.4009ec0.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.Jens Frodesen CV.exe.4009ec0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.70c4c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.70c4c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.70c4c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.7060000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.7060000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.7060000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.7090000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.7090000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.7090000.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.3d8e3c9.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.3d8e3c9.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.3d8e3c9.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.7080000.30.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.7080000.30.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.7080000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.2e354cc.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.2e354cc.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.2e354cc.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.6150000.26.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.6150000.26.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.6150000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.7090000.31.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.7090000.31.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.7090000.31.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.3eafd3a.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.3eafd3a.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.3eafd3a.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.Jens Frodesen CV.exe.3eafd3a.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.7070000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.7070000.29.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.7070000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.3eb9199.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.3eb9199.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.3eb9199.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.Jens Frodesen CV.exe.3eb9199.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.2c22150.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.2c22150.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.2c22150.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.3f98846.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.3f98846.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.3f98846.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.5d60000.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.5d60000.20.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.5d60000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.Jens Frodesen CV.exe.4246338.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.Jens Frodesen CV.exe.4246338.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.Jens Frodesen CV.exe.4246338.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.Jens Frodesen CV.exe.4246338.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 29.2.Jens Frodesen CV.exe.316962c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 29.2.Jens Frodesen CV.exe.316962c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 29.2.Jens Frodesen CV.exe.316962c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.5dd0000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.5dd0000.24.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.5dd0000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.2e4dc2a.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.2e4dc2a.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.2e4dc2a.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 28.2.dhcpmon.exe.33f9660.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 28.2.dhcpmon.exe.33f9660.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 28.2.dhcpmon.exe.33f9660.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.2c15ed4.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.2c15ed4.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.2c15ed4.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.3f8a416.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.3f8a416.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.3f8a416.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.70c0000.35.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.70c0000.35.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.70c0000.35.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.5d60000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.5d60000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.5d60000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.2e3e7d4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.2e3e7d4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.2e3e7d4.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.Jens Frodesen CV.exe.2e3e7d4.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.7100000.36.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.7100000.36.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.7100000.36.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.70ce8a4.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.70ce8a4.34.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.70ce8a4.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.3f8a416.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.3f8a416.14.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.3f8a416.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 28.2.dhcpmon.exe.43db7d6.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 28.2.dhcpmon.exe.43db7d6.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 28.2.dhcpmon.exe.43db7d6.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.3f98846.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.3f98846.15.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.3f98846.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.7100000.36.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.7100000.36.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.7100000.36.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 28.2.dhcpmon.exe.43f95f8.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 28.2.dhcpmon.exe.43f95f8.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 28.2.dhcpmon.exe.43f95f8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.5400000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.5400000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.5400000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.3d9a5fd.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.3d9a5fd.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.Jens Frodesen CV.exe.3d9a5fd.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.2e3e7d4.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.2e3e7d4.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.2e3e7d4.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.Jens Frodesen CV.exe.2e3e7d4.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.6154629.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.6154629.25.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.6154629.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.5dc0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.5dc0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.5dc0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.70b0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.70b0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.70b0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.2e4dc2a.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.2e4dc2a.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.2e4dc2a.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.5db0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.5db0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.5db0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.5d70000.21.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.5d70000.21.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.5d70000.21.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.6150000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.6150000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.6150000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.3daec2a.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.3daec2a.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.3daec2a.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.Jens Frodesen CV.exe.3daec2a.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.4015710.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.4015710.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.4015710.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.Jens Frodesen CV.exe.4015710.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.40108da.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.40108da.16.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.40108da.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.Jens Frodesen CV.exe.40108da.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.4019d39.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.4019d39.18.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.4019d39.18.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.Jens Frodesen CV.exe.4019d39.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.2ba8190.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.Jens Frodesen CV.exe.2ba8190.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.2ba8190.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.Jens Frodesen CV.exe.2ba8190.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.Jens Frodesen CV.exe.4246338.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.Jens Frodesen CV.exe.4246338.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.Jens Frodesen CV.exe.4246338.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.Jens Frodesen CV.exe.4246338.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.Jens Frodesen CV.exe.3d8e3c9.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.Jens Frodesen CV.exe.3d8e3c9.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.Jens Frodesen CV.exe.3d8e3c9.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.548893461.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.548893461.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.548893461.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000000.278495402.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000000.278495402.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000000.278495402.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000001C.00000002.411921875.0000000004408000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.526400449.0000000002E2B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.526400449.0000000002E2B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.544737083.0000000006150000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.544737083.0000000006150000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.544737083.0000000006150000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000001C.00000002.405231773.0000000003391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000001C.00000002.405231773.0000000003391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.541798909.0000000005400000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.541798909.0000000005400000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.541798909.0000000005400000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.548537445.0000000007080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.548537445.0000000007080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.548537445.0000000007080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000000.00000002.286466691.0000000003EF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.286466691.0000000003EF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.286466691.0000000003EF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.549029017.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.549029017.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.549029017.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.542986660.0000000005DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.542986660.0000000005DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.542986660.0000000005DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.542226366.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.542226366.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.542226366.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.548413055.0000000007070000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.548413055.0000000007070000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.548413055.0000000007070000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.542387318.0000000005D70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.542387318.0000000005D70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.542387318.0000000005D70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000001C.00000002.411534974.00000000043EF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000003.486665310.0000000006A38000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.542908530.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.542908530.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.542908530.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000001D.00000002.405844203.0000000003101000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000001D.00000002.405844203.0000000003101000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.549521024.0000000007100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.549521024.0000000007100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.549521024.0000000007100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.548343986.0000000007060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.548343986.0000000007060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.548343986.0000000007060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.548639274.0000000007090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.548639274.0000000007090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.548639274.0000000007090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000001C.00000002.410904877.00000000043DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000000.00000002.290258767.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.290258767.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.290258767.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: Jens Frodesen CV.exe PID: 2932, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: Jens Frodesen CV.exe PID: 2932, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: Jens Frodesen CV.exe PID: 2932, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: Jens Frodesen CV.exe PID: 5344, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: Jens Frodesen CV.exe PID: 5344, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: Jens Frodesen CV.exe PID: 5344, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: dhcpmon.exe PID: 3104, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: dhcpmon.exe PID: 3104, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: Jens Frodesen CV.exe PID: 4720, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: Jens Frodesen CV.exe PID: 4720, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Jens Frodesen CV.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 3.2.Jens Frodesen CV.exe.7080000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.7080000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.7080000.30.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.7080000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.2c22150.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2c22150.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2c22150.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.2c22150.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.Jens Frodesen CV.exe.2c22150.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.2c15ed4.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2c15ed4.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2c15ed4.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.2c15ed4.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.Jens Frodesen CV.exe.2c15ed4.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.70c0000.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.70c0000.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.70c0000.35.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.70c0000.35.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.3d9a5fd.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3d9a5fd.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3d9a5fd.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.3d9a5fd.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.4015710.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.4015710.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.4015710.17.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.4015710.17.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.5dd0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5dd0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5dd0000.24.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.5dd0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.5dc0000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5dc0000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5dc0000.23.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.5dc0000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.5d70000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5d70000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5d70000.21.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.5d70000.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.3f815e7.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3f815e7.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3f815e7.13.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.3f815e7.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.7070000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.7070000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.7070000.29.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.7070000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.70b0000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.70b0000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.70b0000.32.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.70b0000.32.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.3f815e7.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3f815e7.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3f815e7.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.3f815e7.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.Jens Frodesen CV.exe.3f815e7.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.2e354cc.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2e354cc.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2e354cc.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.2e354cc.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.Jens Frodesen CV.exe.2e354cc.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.Jens Frodesen CV.exe.4009ec0.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.Jens Frodesen CV.exe.4009ec0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.Jens Frodesen CV.exe.4009ec0.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.Jens Frodesen CV.exe.4009ec0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.70c4c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.70c4c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.70c4c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.70c4c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.7060000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.7060000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.7060000.28.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.7060000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.7090000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.7090000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.7090000.31.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.7090000.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.3d8e3c9.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3d8e3c9.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3d8e3c9.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.3d8e3c9.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.7080000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.7080000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.7080000.30.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.7080000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.2e354cc.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2e354cc.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2e354cc.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.2e354cc.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.6150000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.6150000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.6150000.26.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.6150000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.7090000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.7090000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.7090000.31.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.7090000.31.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.3eafd3a.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3eafd3a.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3eafd3a.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.3eafd3a.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.Jens Frodesen CV.exe.3eafd3a.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.7070000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.7070000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.7070000.29.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.7070000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.3eb9199.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3eb9199.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3eb9199.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.3eb9199.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.Jens Frodesen CV.exe.3eb9199.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.2c22150.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2c22150.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2c22150.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.2c22150.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.3f98846.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3f98846.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3f98846.15.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.3f98846.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.5d60000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5d60000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5d60000.20.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.5d60000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.Jens Frodesen CV.exe.4246338.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.Jens Frodesen CV.exe.4246338.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.Jens Frodesen CV.exe.4246338.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.Jens Frodesen CV.exe.4246338.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.Jens Frodesen CV.exe.4246338.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 29.2.Jens Frodesen CV.exe.316962c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 29.2.Jens Frodesen CV.exe.316962c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 29.2.Jens Frodesen CV.exe.316962c.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 29.2.Jens Frodesen CV.exe.316962c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.5dd0000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5dd0000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5dd0000.24.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.5dd0000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.2e4dc2a.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2e4dc2a.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2e4dc2a.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.2e4dc2a.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 28.2.dhcpmon.exe.33f9660.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 28.2.dhcpmon.exe.33f9660.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 28.2.dhcpmon.exe.33f9660.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 28.2.dhcpmon.exe.33f9660.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.2c15ed4.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2c15ed4.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2c15ed4.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.2c15ed4.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.3f8a416.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3f8a416.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3f8a416.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.3f8a416.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.70c0000.35.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.70c0000.35.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.70c0000.35.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.70c0000.35.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.5d60000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5d60000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5d60000.20.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.5d60000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.2e3e7d4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2e3e7d4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2e3e7d4.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.2e3e7d4.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.Jens Frodesen CV.exe.2e3e7d4.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.7100000.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.7100000.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.7100000.36.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.7100000.36.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.70ce8a4.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.70ce8a4.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.70ce8a4.34.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.70ce8a4.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.3f8a416.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3f8a416.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3f8a416.14.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.3f8a416.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 28.2.dhcpmon.exe.43db7d6.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 28.2.dhcpmon.exe.43db7d6.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 28.2.dhcpmon.exe.43db7d6.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 28.2.dhcpmon.exe.43db7d6.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.3f98846.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3f98846.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3f98846.15.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.3f98846.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.7100000.36.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.7100000.36.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.7100000.36.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.7100000.36.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 28.2.dhcpmon.exe.43f95f8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 28.2.dhcpmon.exe.43f95f8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 28.2.dhcpmon.exe.43f95f8.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 28.2.dhcpmon.exe.43f95f8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.5400000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5400000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5400000.19.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.5400000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.3d9a5fd.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.3d9a5fd.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.Jens Frodesen CV.exe.3d9a5fd.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.2e3e7d4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2e3e7d4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2e3e7d4.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.2e3e7d4.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.Jens Frodesen CV.exe.2e3e7d4.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.6154629.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.6154629.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.6154629.25.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.6154629.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.5dc0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5dc0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5dc0000.23.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.5dc0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.70b0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.70b0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.70b0000.32.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.70b0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.2e4dc2a.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2e4dc2a.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2e4dc2a.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.2e4dc2a.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.5db0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5db0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5db0000.22.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.5db0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.5d70000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5d70000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.5d70000.21.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.5d70000.21.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.6150000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.6150000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.6150000.26.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.6150000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.3daec2a.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.3daec2a.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.3daec2a.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.Jens Frodesen CV.exe.3daec2a.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.4015710.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.4015710.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.4015710.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.Jens Frodesen CV.exe.4015710.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.40108da.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.40108da.16.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.40108da.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.Jens Frodesen CV.exe.40108da.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.4019d39.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.4019d39.18.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.4019d39.18.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.Jens Frodesen CV.exe.4019d39.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.2ba8190.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.Jens Frodesen CV.exe.2ba8190.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.2ba8190.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.Jens Frodesen CV.exe.2ba8190.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.Jens Frodesen CV.exe.4246338.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.Jens Frodesen CV.exe.4246338.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.Jens Frodesen CV.exe.4246338.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.Jens Frodesen CV.exe.4246338.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.Jens Frodesen CV.exe.3d8e3c9.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.Jens Frodesen CV.exe.3d8e3c9.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.Jens Frodesen CV.exe.3d8e3c9.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.548893461.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.548893461.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.548893461.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.548893461.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000000.278495402.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000000.278495402.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000000.278495402.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000001C.00000002.411921875.0000000004408000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.526400449.0000000002E2B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.526400449.0000000002E2B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.544737083.0000000006150000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.544737083.0000000006150000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.544737083.0000000006150000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.544737083.0000000006150000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000001C.00000002.405231773.0000000003391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000001C.00000002.405231773.0000000003391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.541798909.0000000005400000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.541798909.0000000005400000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.541798909.0000000005400000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.541798909.0000000005400000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.548537445.0000000007080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.548537445.0000000007080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.548537445.0000000007080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.548537445.0000000007080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000000.00000002.286466691.0000000003EF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.286466691.0000000003EF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.286466691.0000000003EF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.549029017.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.549029017.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.549029017.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.549029017.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.542986660.0000000005DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.542986660.0000000005DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.542986660.0000000005DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.542986660.0000000005DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.542226366.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.542226366.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.542226366.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.542226366.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.548413055.0000000007070000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.548413055.0000000007070000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.548413055.0000000007070000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.548413055.0000000007070000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.542387318.0000000005D70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.542387318.0000000005D70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.542387318.0000000005D70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.542387318.0000000005D70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000001C.00000002.411534974.00000000043EF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000003.486665310.0000000006A38000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.542908530.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.542908530.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.542908530.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.542908530.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000001D.00000002.405844203.0000000003101000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000001D.00000002.405844203.0000000003101000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.549521024.0000000007100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.549521024.0000000007100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.549521024.0000000007100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.549521024.0000000007100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.548343986.0000000007060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.548343986.0000000007060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.548343986.0000000007060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.548343986.0000000007060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.548639274.0000000007090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.548639274.0000000007090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.548639274.0000000007090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.548639274.0000000007090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000001C.00000002.410904877.00000000043DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000000.00000002.290258767.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.290258767.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.290258767.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: Jens Frodesen CV.exe PID: 2932, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: Jens Frodesen CV.exe PID: 2932, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: Jens Frodesen CV.exe PID: 2932, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: Jens Frodesen CV.exe PID: 2932, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: Jens Frodesen CV.exe PID: 5344, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: Jens Frodesen CV.exe PID: 5344, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: Jens Frodesen CV.exe PID: 5344, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: Jens Frodesen CV.exe PID: 244, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: dhcpmon.exe PID: 4320, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: dhcpmon.exe PID: 988, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: dhcpmon.exe PID: 3104, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: dhcpmon.exe PID: 3104, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: Jens Frodesen CV.exe PID: 4720, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: Jens Frodesen CV.exe PID: 4720, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 0_2_0125C64C0_2_0125C64C
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 0_2_0125E8C90_2_0125E8C9
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 0_2_0125E8D80_2_0125E8D8
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_071033243_2_07103324
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_07113DB03_2_07113DB0
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_071046D33_2_071046D3
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_071042EB3_2_071042EB
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_00F9E4803_2_00F9E480
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_00F9E4713_2_00F9E471
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_00F9BBD43_2_00F9BBD4
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_065492183_2_06549218
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_065400403_2_06540040
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_06549E203_2_06549E20
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_06549EEE3_2_06549EEE
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_0654D91A3_2_0654D91A
Source: Jens Frodesen CV.exe, 00000000.00000002.301886862.00000000075D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameQuestKingdom.dllH vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000000.00000002.286466691.0000000003EF9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQuestKingdom.dllH vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000000.00000002.286466691.0000000003EF9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000000.00000000.232835260.0000000000932000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSKaoF7b.exe4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000000.00000002.303159128.00000000078D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000000.00000002.290258767.00000000041C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSKaoF7b.exe4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.548990207.00000000070B8000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.549642575.000000000710E000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.544979111.0000000006170000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.526400449.0000000002E2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.526400449.0000000002E2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.526400449.0000000002E2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.526400449.0000000002E2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.544737083.0000000006150000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.544737083.0000000006150000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.549361044.00000000070E8000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.548537445.0000000007080000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.530692383.0000000003BF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.549029017.00000000070C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.549029017.00000000070C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.542226366.0000000005D60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.542986660.0000000005DC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.542908530.0000000005DB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.548413055.0000000007070000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.542387318.0000000005D70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000003.486665310.0000000006A38000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.548343986.0000000007060000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 00000003.00000002.548736594.000000000709E000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 0000000C.00000002.360950015.000000000160A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 0000000C.00000002.373661578.000000000468B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 0000001D.00000002.411388148.0000000004157000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 0000001D.00000002.411703943.0000000004168000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 0000001D.00000002.411703943.0000000004168000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 0000001D.00000002.405844203.0000000003101000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 0000001D.00000002.405844203.0000000003101000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exe, 0000001D.00000002.410964095.000000000414D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exeBinary or memory string: OriginalFilenameSKaoF7b.exe4 vs Jens Frodesen CV.exe
Source: Jens Frodesen CV.exeReversingLabs: Detection: 60%
Source: Jens Frodesen CV.exeVirustotal: Detection: 56%
Source: Jens Frodesen CV.exeMetadefender: Detection: 33%
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeFile read: C:\Users\user\Desktop\Jens Frodesen CV.exeJump to behavior
Source: Jens Frodesen CV.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Jens Frodesen CV.exe "C:\Users\user\Desktop\Jens Frodesen CV.exe"
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmp476F.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Users\user\Desktop\Jens Frodesen CV.exe {path}
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp7194.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp75AC.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\user\Desktop\Jens Frodesen CV.exe "C:\Users\user\Desktop\Jens Frodesen CV.exe" 0
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmpBFFB.tmp
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmpC1DF.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Users\user\Desktop\Jens Frodesen CV.exe {path}
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Users\user\Desktop\Jens Frodesen CV.exe {path}
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmpE91E.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmp476F.tmpJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Users\user\Desktop\Jens Frodesen CV.exe {path}Jump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp7194.tmpJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp75AC.tmpJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmpBFFB.tmpJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Users\user\Desktop\Jens Frodesen CV.exe {path}Jump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Users\user\Desktop\Jens Frodesen CV.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmpC1DF.tmpJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmpE91E.tmp
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeFile created: C:\Users\user\AppData\Roaming\LrSEeB.exeJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeFile created: C:\Users\user\AppData\Local\Temp\tmp476F.tmpJump to behavior
Source: classification engineClassification label: mal100.troj.evad.winEXE@32/15@7/2
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: Jens Frodesen CV.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2600:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5200:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5628:120:WilError_01
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{fba1bbc6-2cc8-4c94-b6c0-dda5a12fd7fe}
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5552:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5320:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5556:120:WilError_01
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
Source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
Source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: Jens Frodesen CV.exeStatic file information: File size 1053184 > 1048576
Source: Jens Frodesen CV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Jens Frodesen CV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.542986660.0000000005DC0000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.548343986.0000000007060000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.548537445.0000000007080000.00000004.08000000.00040000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.542908530.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.548413055.0000000007070000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_0654E66A push eax; iretd 3_2_0654E675
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_0654C6D8 pushad ; ret 3_2_0654C6D9
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_0654D701 push es; retf 3_2_0654D720
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_0654D721 push ecx; iretd 3_2_0654D741
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_0654D7D2 push ecx; iretd 3_2_0654D7D9
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_0654D799 push ecx; iretd 3_2_0654D7D1
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_0654D566 push es; retf 3_2_0654D58C
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_065475A8 push eax; iretd 3_2_065475B9
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_06544FEC push es; ret 3_2_06544FF0
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeCode function: 3_2_0654D831 push es; retf 3_2_0654D850
Source: initial sampleStatic PE information: section name: .text entropy: 6.901351263212902
Source: initial sampleStatic PE information: section name: .text entropy: 6.901351263212902
Source: initial sampleStatic PE information: section name: .text entropy: 6.901351263212902
Source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeFile created: C:\Users\user\AppData\Roaming\LrSEeB.exeJump to dropped file
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmp476F.tmp

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeFile opened: C:\Users\user\Desktop\Jens Frodesen CV.exe:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: Yara matchFile source: Process Memory Space: Jens Frodesen CV.exe PID: 2932, type: MEMORYSTR
Source: Jens Frodesen CV.exe, 00000000.00000002.282970188.0000000002F2B000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 0000000C.00000002.370524065.0000000003429000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000E.00000002.364976237.0000000003129000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000014.00000002.398586716.00000000032C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
Source: Jens Frodesen CV.exe, 00000000.00000002.282970188.0000000002F2B000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 0000000C.00000002.370524065.0000000003429000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000E.00000002.364976237.0000000003129000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000014.00000002.398586716.00000000032C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
Source: C:\Users\user\Desktop\Jens Frodesen CV.exe TID: 5236Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exe TID: 4160Thread sleep time: -11068046444225724s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exe TID: 3784Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5264Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2872Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2236Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\Desktop\Jens Frodesen CV.exe TID: 6080Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5760Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeWindow / User API: threadDelayed 9682Jump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeWindow / User API: foregroundWindowGot 648Jump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: dhcpmon.exe, 00000014.00000002.398586716.00000000032C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
Source: dhcpmon.exe, 00000014.00000002.398586716.00000000032C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
Source: dhcpmon.exe, 00000014.00000002.412145618.0000000007480000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}a
Source: dhcpmon.exe, 00000014.00000002.398586716.00000000032C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: dhcpmon.exe, 00000014.00000002.398586716.00000000032C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
Source: dhcpmon.exe, 00000014.00000002.398586716.00000000032C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
Source: dhcpmon.exe, 00000014.00000002.398586716.00000000032C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: dhcpmon.exe, 0000000E.00000002.406829788.00000000074B0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: dhcpmon.exe, 00000014.00000002.398586716.00000000032C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
Source: dhcpmon.exe, 00000014.00000002.398586716.00000000032C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
Source: dhcpmon.exe, 00000014.00000002.398586716.00000000032C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
Source: Jens Frodesen CV.exe, 00000003.00000002.515029123.0000000000D76000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeMemory written: C:\Users\user\Desktop\Jens Frodesen CV.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeMemory written: C:\Users\user\Desktop\Jens Frodesen CV.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmp476F.tmpJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Users\user\Desktop\Jens Frodesen CV.exe {path}Jump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp7194.tmpJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp75AC.tmpJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmpBFFB.tmpJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Users\user\Desktop\Jens Frodesen CV.exe {path}Jump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeProcess created: C:\Users\user\Desktop\Jens Frodesen CV.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmpC1DF.tmpJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmpE91E.tmp
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: Jens Frodesen CV.exe, 00000003.00000002.527788716.0000000002ECA000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.529206395.0000000002F80000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.523130514.0000000002C97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerD$
Source: Jens Frodesen CV.exe, 00000003.00000002.548139283.0000000006D5B000.00000004.00000010.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.547077146.0000000006A0C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager
Source: Jens Frodesen CV.exe, 00000003.00000002.545174936.00000000062BD000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager x
Source: Jens Frodesen CV.exe, 00000003.00000002.544654482.000000000614A000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Users\user\Desktop\Jens Frodesen CV.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Users\user\Desktop\Jens Frodesen CV.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Users\user\Desktop\Jens Frodesen CV.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Users\user\Desktop\Jens Frodesen CV.exe VolumeInformation
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\Jens Frodesen CV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Stealing of Sensitive Information

barindex
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.4015710.17.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Jens Frodesen CV.exe.4009ec0.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.6150000.26.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.3eafd3a.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.3eb9199.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Jens Frodesen CV.exe.4246338.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.6154629.25.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.6150000.26.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.4015710.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.40108da.16.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.4019d39.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Jens Frodesen CV.exe.4246338.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000000.278495402.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.544737083.0000000006150000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001C.00000002.405231773.0000000003391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.286466691.0000000003EF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001D.00000002.405844203.0000000003101000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.290258767.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: Jens Frodesen CV.exe PID: 2932, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Jens Frodesen CV.exe PID: 5344, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3104, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Jens Frodesen CV.exe PID: 4720, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Jens Frodesen CV.exe, 00000000.00000002.286466691.0000000003EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000000.00000002.290258767.00000000041C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exeString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: Jens Frodesen CV.exe, 00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: Jens Frodesen CV.exe, 00000003.00000002.548893461.00000000070B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: Jens Frodesen CV.exe, 00000003.00000000.278495402.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: Jens Frodesen CV.exe, 00000003.00000002.526400449.0000000002E2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.526400449.0000000002E2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Jens Frodesen CV.exe, 00000003.00000002.544737083.0000000006150000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.548537445.0000000007080000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.548537445.0000000007080000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: Jens Frodesen CV.exe, 00000003.00000002.549029017.00000000070C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: Jens Frodesen CV.exe, 00000003.00000002.542226366.0000000005D60000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.542986660.0000000005DC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.542908530.0000000005DB0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.542908530.0000000005DB0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: Jens Frodesen CV.exe, 00000003.00000002.548413055.0000000007070000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.542387318.0000000005D70000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000003.486665310.0000000006A38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.549521024.0000000007100000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.548343986.0000000007060000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 00000003.00000002.548343986.0000000007060000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: Jens Frodesen CV.exe, 00000003.00000002.548639274.0000000007090000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 0000001C.00000002.405231773.0000000003391000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 0000001C.00000002.405231773.0000000003391000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: dhcpmon.exe, 0000001C.00000002.411921875.0000000004408000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 0000001C.00000002.411921875.0000000004408000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: HApplicationBaseMicrosoft.VisualBasic.ApplicationServicesUserConversionsMicrosoft.VisualBasic.CompilerServicesObjectFlowControlOperatorsProjectDataStandardModuleAttributeComputerMicrosoft.VisualBasic.DevicesHideModuleNameAttributeMyGroupCollectionAttributeContextValue`1Microsoft.VisualBasic.MyServices.InternalClientInvokeDelegateNanoCoreIClientDataNanoCore.ClientPluginIClientNetworkIClientDataHostNanoCore.ClientPluginHostIClientLoggingHostIClientNetworkHostIClientUIHostIClientNameObjectCollectionIClientReadOnlyNameObjectCollectionActivatorAppDomainArgumentOutOfRangeExceptionArrayAsyncCallbackBitConverterBooleanBufferByteCharCLSCompliantAttributeGeneratedCodeAttributeSystem.CodeDom.CompilerDictionary`2System.Collections.GenericEnumeratorIEnumerable`1KeyValuePair`2List`1IEnumeratorSystem.CollectionsEditorBrowsableAttributeSystem.ComponentModelEditorBrowsableStateApplicationSettingsBaseSystem.ConfigurationSettingsBaseDateTimeDateTimeKindDelegateDebuggerDis
Source: dhcpmon.exe, 0000001C.00000002.411534974.00000000043EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 0000001C.00000002.411534974.00000000043EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: HApplicationBaseMicrosoft.VisualBasic.ApplicationServicesUserConversionsMicrosoft.VisualBasic.CompilerServicesObjectFlowControlOperatorsProjectDataStandardModuleAttributeComputerMicrosoft.VisualBasic.DevicesHideModuleNameAttributeMyGroupCollectionAttributeContextValue`1Microsoft.VisualBasic.MyServices.InternalClientInvokeDelegateNanoCoreIClientDataNanoCore.ClientPluginIClientNetworkIClientDataHostNanoCore.ClientPluginHostIClientLoggingHostIClientNetworkHostIClientUIHostIClientNameObjectCollectionIClientReadOnlyNameObjectCollectionActivatorAppDomainArgumentOutOfRangeExceptionArrayAsyncCallbackBitConverterBooleanBufferByteCharCLSCompliantAttributeGeneratedCodeAttributeSystem.CodeDom.CompilerDictionary`2System.Collections.GenericEnumeratorIEnumerable`1KeyValuePair`2List`1IEnumeratorSystem.CollectionsEditorBrowsableAttributeSystem.ComponentModelEditorBrowsableStateApplicationSettingsBaseSystem.ConfigurationSettingsBaseDateTimeDateTimeKind
Source: dhcpmon.exe, 0000001C.00000002.410904877.00000000043DB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 0000001C.00000002.410904877.00000000043DB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Jens Frodesen CV.exe, 0000001D.00000002.405844203.0000000003101000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: Jens Frodesen CV.exe, 0000001D.00000002.405844203.0000000003101000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.4015710.17.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.0.Jens Frodesen CV.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Jens Frodesen CV.exe.4009ec0.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.6150000.26.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.3eafd3a.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.3eb9199.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Jens Frodesen CV.exe.4246338.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.3eb4b70.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.6154629.25.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.6150000.26.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.4015710.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.40108da.16.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.Jens Frodesen CV.exe.4019d39.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Jens Frodesen CV.exe.4246338.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000000.278495402.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.544737083.0000000006150000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001C.00000002.405231773.0000000003391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.286466691.0000000003EF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000001D.00000002.405844203.0000000003101000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.290258767.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: Jens Frodesen CV.exe PID: 2932, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Jens Frodesen CV.exe PID: 5344, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3104, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: Jens Frodesen CV.exe PID: 4720, type: MEMORYSTR
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Scheduled Task/Job
1
Scheduled Task/Job
112
Process Injection
2
Masquerading
21
Input Capture
21
Security Software Discovery
Remote Services21
Input Capture
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Scheduled Task/Job
1
Disable or Modify Tools
LSASS Memory2
Process Discovery
Remote Desktop Protocol11
Archive Collected Data
Exfiltration Over Bluetooth1
Non-Standard Port
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
Virtualization/Sandbox Evasion
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Remote Access Software
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer1
Non-Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets1
File and Directory Discovery
SSHKeyloggingData Transfer Size Limits21
Application Layer Protocol
Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
Hidden Files and Directories
Cached Domain Credentials12
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup Items3
Obfuscated Files or Information
DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job12
Software Packing
Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 711362 Sample: Jens Frodesen CV.exe Startdate: 28/09/2022 Architecture: WINDOWS Score: 100 68 brightnano1.ddns.net 2->68 74 Snort IDS alert for network traffic 2->74 76 Multi AV Scanner detection for domain / URL 2->76 78 Malicious sample detected (through community Yara rule) 2->78 80 15 other signatures 2->80 9 Jens Frodesen CV.exe 6 2->9         started        13 Jens Frodesen CV.exe 4 2->13         started        15 dhcpmon.exe 5 2->15         started        17 dhcpmon.exe 2->17         started        signatures3 process4 file5 62 C:\Users\user\AppData\Roaming\LrSEeB.exe, PE32 9->62 dropped 64 C:\Users\user\AppData\Local\...\tmp476F.tmp, XML 9->64 dropped 66 C:\Users\user\...\Jens Frodesen CV.exe.log, ASCII 9->66 dropped 84 Injects a PE file into a foreign processes 9->84 19 Jens Frodesen CV.exe 1 14 9->19         started        24 schtasks.exe 1 9->24         started        26 schtasks.exe 13->26         started        28 Jens Frodesen CV.exe 13->28         started        30 Jens Frodesen CV.exe 13->30         started        32 schtasks.exe 15->32         started        34 dhcpmon.exe 15->34         started        36 schtasks.exe 17->36         started        38 dhcpmon.exe 17->38         started        signatures6 process7 dnsIp8 70 brightnano1.ddns.net 171.22.30.170, 1989, 49714, 49715 CMCSUS Germany 19->70 72 171.22.30.97, 1989 CMCSUS Germany 19->72 56 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->56 dropped 58 C:\Users\user\AppData\Roaming\...\run.dat, data 19->58 dropped 60 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 19->60 dropped 82 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->82 40 schtasks.exe 1 19->40         started        42 schtasks.exe 1 19->42         started        44 conhost.exe 24->44         started        46 conhost.exe 26->46         started        48 conhost.exe 32->48         started        50 conhost.exe 36->50         started        file9 signatures10 process11 process12 52 conhost.exe 40->52         started        54 conhost.exe 42->54         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Jens Frodesen CV.exe60%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
Jens Frodesen CV.exe57%VirustotalBrowse
Jens Frodesen CV.exe33%MetadefenderBrowse
Jens Frodesen CV.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\LrSEeB.exe100%Joe Sandbox ML
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe60%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe57%VirustotalBrowse
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe33%MetadefenderBrowse
C:\Users\user\AppData\Roaming\LrSEeB.exe60%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
C:\Users\user\AppData\Roaming\LrSEeB.exe33%MetadefenderBrowse
SourceDetectionScannerLabelLinkDownload
3.0.Jens Frodesen CV.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
3.2.Jens Frodesen CV.exe.6150000.26.unpack100%AviraTR/NanoCore.fadteDownload File
SourceDetectionScannerLabelLink
brightnano1.ddns.net14%VirustotalBrowse
SourceDetectionScannerLabelLink
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.tiro.com0%URL Reputationsafe
0%Avira URL Cloudsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe
brightnano1.ddns.net14%VirustotalBrowse
brightnano1.ddns.net100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
brightnano1.ddns.net
171.22.30.170
truetrueunknown
NameMaliciousAntivirus DetectionReputation
true
  • Avira URL Cloud: safe
low
brightnano1.ddns.nettrue
  • 14%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://www.apache.org/licenses/LICENSE-2.0Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    http://www.fontbureau.comJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.fontbureau.com/designersGJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.fontbureau.com/designers/?Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.founder.com.cn/cn/bTheJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com/designers?Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.tiro.comJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designersJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.goodfont.co.krJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://google.comJens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.548413055.0000000007070000.00000004.08000000.00040000.00000000.sdmpfalse
                high
                http://www.carterandcone.comlJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.sajatypeworks.comJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.typography.netDJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers/cabarga.htmlNJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/cTheJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.galapagosdesign.com/staff/dennis.htmJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://fontfabrik.comJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.founder.com.cn/cnJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/frere-jones.htmlJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.jiyu-kobo.co.jp/Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/DPleaseJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers8Jens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fonts.comJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000000.00000003.240997438.000000000123C000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.sandoll.co.krJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.urwpp.deDPleaseJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.zhongyicts.com.cnJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameJens Frodesen CV.exe, 00000000.00000002.282970188.0000000002F2B000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Jens Frodesen CV.exe, 0000000C.00000002.370323682.0000000003421000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000E.00000002.364394906.000000000310B000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000014.00000002.398299174.00000000032C1000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.sakkal.comJens Frodesen CV.exe, 00000000.00000002.297402479.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          171.22.30.97
                          unknownGermany
                          33657CMCSUSfalse
                          171.22.30.170
                          brightnano1.ddns.netGermany
                          33657CMCSUStrue
                          Joe Sandbox Version:36.0.0 Rainbow Opal
                          Analysis ID:711362
                          Start date and time:2022-09-28 04:10:25 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 11m 4s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Sample file name:Jens Frodesen CV.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:42
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@32/15@7/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 38
                          • Number of non-executed functions: 4
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, RuntimeBroker.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                          • Excluded IPs from analysis (whitelisted): 20.190.159.5, 20.190.159.72, 20.190.159.74, 40.126.31.64, 20.190.159.70, 20.190.159.3, 40.126.31.68, 20.190.159.69, 20.82.210.154
                          • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, prda.aadg.msidentity.com, login.live.com, ctldl.windowsupdate.com, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, arc.msn.com, login.msa.msidentity.com, www.tm.a.prd.aadg.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          04:11:31API Interceptor813x Sleep call for process: Jens Frodesen CV.exe modified
                          04:11:42AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          04:11:44Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\Jens Frodesen CV.exe" s>$(Arg0)
                          04:11:44Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                          04:12:05API Interceptor2x Sleep call for process: dhcpmon.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          171.22.30.97remittance.exeGet hashmaliciousBrowse
                            RFQ23449.exeGet hashmaliciousBrowse
                              171.22.30.170Jens Frodesen CV.exeGet hashmaliciousBrowse
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                brightnano1.ddns.netJens Frodesen CV.exeGet hashmaliciousBrowse
                                • 171.22.30.170
                                remittance.exeGet hashmaliciousBrowse
                                • 171.22.30.97
                                Re Remittance Advice.exeGet hashmaliciousBrowse
                                • 171.22.30.97
                                RFQ23449.exeGet hashmaliciousBrowse
                                • 171.22.30.97
                                SecuriteInfo.com.W32.AIDetectNet.01.22085.exeGet hashmaliciousBrowse
                                • 107.182.129.128
                                SecuriteInfo.com.IL.Trojan.MSILZilla.22069.19688.exeGet hashmaliciousBrowse
                                • 107.182.129.128
                                SecuriteInfo.com.W32.AIDetectNet.01.13156.exeGet hashmaliciousBrowse
                                • 107.182.129.128
                                gfcytttt.exeGet hashmaliciousBrowse
                                • 107.182.129.128
                                SecuriteInfo.com.W32.AIDetectNet.01.17432.exeGet hashmaliciousBrowse
                                • 105.112.217.248
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                CMCSUSFRT-2022-DDSP00001-B(01).exeGet hashmaliciousBrowse
                                • 81.161.229.148
                                file.exeGet hashmaliciousBrowse
                                • 171.22.30.106
                                file.exeGet hashmaliciousBrowse
                                • 171.22.30.106
                                41050#U00b780 swedbank#U00b7pdf.exeGet hashmaliciousBrowse
                                • 171.22.30.72
                                file.exeGet hashmaliciousBrowse
                                • 171.22.30.106
                                file.exeGet hashmaliciousBrowse
                                • 171.22.30.106
                                file.exeGet hashmaliciousBrowse
                                • 171.22.30.106
                                file.exeGet hashmaliciousBrowse
                                • 171.22.30.106
                                SecuriteInfo.com.Win32.DropperX-gen.17548.exeGet hashmaliciousBrowse
                                • 81.161.229.7
                                file.exeGet hashmaliciousBrowse
                                • 171.22.30.106
                                file.exeGet hashmaliciousBrowse
                                • 171.22.30.106
                                cnf14532432,pdf.vbsGet hashmaliciousBrowse
                                • 81.161.229.196
                                file.exeGet hashmaliciousBrowse
                                • 171.22.30.106
                                file.exeGet hashmaliciousBrowse
                                • 171.22.30.106
                                file.exeGet hashmaliciousBrowse
                                • 171.22.30.106
                                file.exeGet hashmaliciousBrowse
                                • 171.22.30.106
                                file.exeGet hashmaliciousBrowse
                                • 171.22.30.106
                                file.exeGet hashmaliciousBrowse
                                • 171.22.30.106
                                file.exeGet hashmaliciousBrowse
                                • 171.22.30.106
                                file.exeGet hashmaliciousBrowse
                                • 171.22.30.106
                                No context
                                No context
                                Process:C:\Users\user\Desktop\Jens Frodesen CV.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):1053184
                                Entropy (8bit):6.863226854581627
                                Encrypted:false
                                SSDEEP:12288:kgqC2JPYZVj5taS55PO88JplF4HwjADqjJ5ndW+/Pi7gvkdCOVy/0BA+l6lhIiob:kg52p4J5tz688j4HojrIaE
                                MD5:89197E451346ED5A3BA154F394948DE7
                                SHA1:0E9D39EC84881CA095A9C1400D64EC586E983402
                                SHA-256:DBAB1BF30E571BDDF1C21A19BEDEBFFD5A348145EA76ABDDC34A5172DF49AA3B
                                SHA-512:F1C6BBDCB883E3DF94F497B5F7832A02AA455BEC92C680CD4DB0DDD9870E2AB3FBFB012C10B6E1983CDA81F3652C4878639E858D48E311394F8258D06D7E47B6
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 60%
                                • Antivirus: Virustotal, Detection: 57%, Browse
                                • Antivirus: Metadefender, Detection: 33%, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<1c..............P..:...........X... ...`....@.. .......................`............@..................................W..K....`.. ....................@....................................................... ............... ..H............text...48... ...:.................. ..`.rsrc... ....`.......<..............@..@.reloc.......@......................@..B.................X......H.......`E...................+...........................................*..(&...*&..('....*.s(........s)........s*........s+........s,........*Z........o?...........*&..(@....*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*...{......,.+.....,.rq..psB...z..|....(...+*...{......,.+.....,.rq..psB...z..|....(...+*...{......,.+.....,.rq..psB...z..|....(...+*...{......,.+.....,.rq..psB...z..|....(...+*&........*".......*
                                Process:C:\Users\user\Desktop\Jens Frodesen CV.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Users\user\Desktop\Jens Frodesen CV.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1216
                                Entropy (8bit):5.355304211458859
                                Encrypted:false
                                SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                MD5:69206D3AF7D6EFD08F4B4726998856D3
                                SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                Malicious:true
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1216
                                Entropy (8bit):5.355304211458859
                                Encrypted:false
                                SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                MD5:69206D3AF7D6EFD08F4B4726998856D3
                                SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                Malicious:false
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                Process:C:\Users\user\Desktop\Jens Frodesen CV.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1655
                                Entropy (8bit):5.165507625778931
                                Encrypted:false
                                SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBTtn:cbhH7MlNQ8/rydbz9I3YODOLNdq3f
                                MD5:55D8D7A9509EE994B96E1EB880C39935
                                SHA1:6A017D91DF07846CD90EB5CD160474E905DC06EC
                                SHA-256:14A81BBC5132534A225A0B9EA5049B55F10CC24B8AB0B405ED21F3245B41A566
                                SHA-512:29918549E4E46A74DFE8F9D99743A1FEA2A4EAD15943A8612AC530208075EE708DF9908E778494F8348C522BC4BBB9A2A3BC43B66B2D6D3A70031511F202679C
                                Malicious:true
                                Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                                Process:C:\Users\user\Desktop\Jens Frodesen CV.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1310
                                Entropy (8bit):5.096327253513791
                                Encrypted:false
                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0a5xtn:cbk4oL600QydbQxIYODOLedq3Jj
                                MD5:5CBFC2A6DBBF17C97F318924EF5050EA
                                SHA1:BA8CBBA30078270B9F3FDA3D3D0FF559DBD1EB26
                                SHA-256:A4834B80E5AF7B565790A6D7D6ADF22BE59655EE4912643C97CB5247348B8210
                                SHA-512:098DCE276CA97CE47302002AABE396D6FA825F99DB1F4133D722AFA95E5C84A6343BAF818DCA11EC442170CFC7D904A31C57C857065445B77E6DCDAB0FFFF9F5
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                Process:C:\Users\user\Desktop\Jens Frodesen CV.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1310
                                Entropy (8bit):5.109425792877704
                                Encrypted:false
                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                Process:C:\Users\user\Desktop\Jens Frodesen CV.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1655
                                Entropy (8bit):5.165507625778931
                                Encrypted:false
                                SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBTtn:cbhH7MlNQ8/rydbz9I3YODOLNdq3f
                                MD5:55D8D7A9509EE994B96E1EB880C39935
                                SHA1:6A017D91DF07846CD90EB5CD160474E905DC06EC
                                SHA-256:14A81BBC5132534A225A0B9EA5049B55F10CC24B8AB0B405ED21F3245B41A566
                                SHA-512:29918549E4E46A74DFE8F9D99743A1FEA2A4EAD15943A8612AC530208075EE708DF9908E778494F8348C522BC4BBB9A2A3BC43B66B2D6D3A70031511F202679C
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1655
                                Entropy (8bit):5.165507625778931
                                Encrypted:false
                                SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBTtn:cbhH7MlNQ8/rydbz9I3YODOLNdq3f
                                MD5:55D8D7A9509EE994B96E1EB880C39935
                                SHA1:6A017D91DF07846CD90EB5CD160474E905DC06EC
                                SHA-256:14A81BBC5132534A225A0B9EA5049B55F10CC24B8AB0B405ED21F3245B41A566
                                SHA-512:29918549E4E46A74DFE8F9D99743A1FEA2A4EAD15943A8612AC530208075EE708DF9908E778494F8348C522BC4BBB9A2A3BC43B66B2D6D3A70031511F202679C
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1655
                                Entropy (8bit):5.165507625778931
                                Encrypted:false
                                SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBTtn:cbhH7MlNQ8/rydbz9I3YODOLNdq3f
                                MD5:55D8D7A9509EE994B96E1EB880C39935
                                SHA1:6A017D91DF07846CD90EB5CD160474E905DC06EC
                                SHA-256:14A81BBC5132534A225A0B9EA5049B55F10CC24B8AB0B405ED21F3245B41A566
                                SHA-512:29918549E4E46A74DFE8F9D99743A1FEA2A4EAD15943A8612AC530208075EE708DF9908E778494F8348C522BC4BBB9A2A3BC43B66B2D6D3A70031511F202679C
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                                Process:C:\Users\user\Desktop\Jens Frodesen CV.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):232
                                Entropy (8bit):7.024371743172393
                                Encrypted:false
                                SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                                MD5:32D0AAE13696FF7F8AF33B2D22451028
                                SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                                SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                                SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                                Malicious:false
                                Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                                Process:C:\Users\user\Desktop\Jens Frodesen CV.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):8
                                Entropy (8bit):3.0
                                Encrypted:false
                                SSDEEP:3:Jdq:W
                                MD5:957331451386AE435E3B86B0084CC12E
                                SHA1:4612E788AAA86585B69B5FEA3592B3C62148BE7E
                                SHA-256:B4CE45C0E6531694158D06FB628C97C2591C419C009772463F04BFF2C39CA7DB
                                SHA-512:1418FD7FA9A1C8DBC593E690F0D8DC3F3E12956FCD97139EED7C69F46AB82715C548A13C2286CE84E8C1BCC46677CDBFC62AF9DE88E96267B1AC6216ED336470
                                Malicious:true
                                Preview:@..8B..H
                                Process:C:\Users\user\Desktop\Jens Frodesen CV.exe
                                File Type:data
                                Category:modified
                                Size (bytes):327432
                                Entropy (8bit):7.99938831605763
                                Encrypted:true
                                SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                                MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                                SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                                SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                                SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                                Malicious:false
                                Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                                Process:C:\Users\user\Desktop\Jens Frodesen CV.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):47
                                Entropy (8bit):4.027473159958119
                                Encrypted:false
                                SSDEEP:3:oN0naRRvuSKBsxiN:oNcSRy0iN
                                MD5:73E6904F37156BBD5D7A3AE29190ABF2
                                SHA1:DA061628C1D1BE6C8648A9F3A26ABAB6F273B8E6
                                SHA-256:95727C1D0DD9664E84D3F23C5D499F4B050AFAE9045E3D362F8E47CBC2F3BECD
                                SHA-512:1060C4516C7A0F336A53C3D60FACD4E0275885E42743CEEFC0849D55BD99278E1EC051E4033AF3A78675E42F52750932D4C6CE0EAA4B544CD055B8D7AB0615F4
                                Malicious:false
                                Preview:C:\Users\user\Desktop\Jens Frodesen CV.exe
                                Process:C:\Users\user\Desktop\Jens Frodesen CV.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):1053184
                                Entropy (8bit):6.863226854581627
                                Encrypted:false
                                SSDEEP:12288:kgqC2JPYZVj5taS55PO88JplF4HwjADqjJ5ndW+/Pi7gvkdCOVy/0BA+l6lhIiob:kg52p4J5tz688j4HojrIaE
                                MD5:89197E451346ED5A3BA154F394948DE7
                                SHA1:0E9D39EC84881CA095A9C1400D64EC586E983402
                                SHA-256:DBAB1BF30E571BDDF1C21A19BEDEBFFD5A348145EA76ABDDC34A5172DF49AA3B
                                SHA-512:F1C6BBDCB883E3DF94F497B5F7832A02AA455BEC92C680CD4DB0DDD9870E2AB3FBFB012C10B6E1983CDA81F3652C4878639E858D48E311394F8258D06D7E47B6
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 60%
                                • Antivirus: Metadefender, Detection: 33%, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<1c..............P..:...........X... ...`....@.. .......................`............@..................................W..K....`.. ....................@....................................................... ............... ..H............text...48... ...:.................. ..`.rsrc... ....`.......<..............@..@.reloc.......@......................@..B.................X......H.......`E...................+...........................................*..(&...*&..('....*.s(........s)........s*........s+........s,........*Z........o?...........*&..(@....*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*...{......,.+.....,.rq..psB...z..|....(...+*...{......,.+.....,.rq..psB...z..|....(...+*...{......,.+.....,.rq..psB...z..|....(...+*...{......,.+.....,.rq..psB...z..|....(...+*&........*".......*
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):6.863226854581627
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Windows Screen Saver (13104/52) 0.07%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                File name:Jens Frodesen CV.exe
                                File size:1053184
                                MD5:89197e451346ed5a3ba154f394948de7
                                SHA1:0e9d39ec84881ca095a9c1400d64ec586e983402
                                SHA256:dbab1bf30e571bddf1c21a19bedebffd5a348145ea76abddc34a5172df49aa3b
                                SHA512:f1c6bbdcb883e3df94f497b5f7832a02aa455bec92c680cd4db0ddd9870e2ab3fbfb012c10b6e1983cda81f3652c4878639e858d48e311394f8258d06d7e47b6
                                SSDEEP:12288:kgqC2JPYZVj5taS55PO88JplF4HwjADqjJ5ndW+/Pi7gvkdCOVy/0BA+l6lhIiob:kg52p4J5tz688j4HojrIaE
                                TLSH:F125195831E6329EF46BC6B58FD87CF59A56F632431F5177607302898B2ED82CE90872
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<1c..............P..:...........X... ...`....@.. .......................`............@................................
                                Icon Hash:64f4d4dcdcdce4ec
                                Entrypoint:0x4f582e
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x63313CDF [Mon Sep 26 05:47:11 2022 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xf57e00x4b.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xf60000xd320.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1040000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000xf38340xf3a00False0.6070470834402257data6.901351263212902IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rsrc0xf60000xd3200xd400False0.24318248820754718data4.756478683576001IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x1040000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountry
                                RT_ICON0xf62800x176dPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                RT_ICON0xf79f00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0
                                RT_ICON0xfbc180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
                                RT_ICON0xfe1c00x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 0
                                RT_ICON0xffc280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                                RT_ICON0x100cd00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0
                                RT_ICON0x1016580x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 0
                                RT_ICON0x101d100x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
                                RT_GROUP_ICON0x1021780x76data
                                RT_VERSION0x1021f00x314data
                                RT_MANIFEST0x1025040xe15XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF, LF line terminators
                                DLLImport
                                mscoree.dll_CorExeMain
                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                192.168.2.7171.22.30.1704973019892816766 09/28/22-04:13:14.999476TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497301989192.168.2.7171.22.30.170
                                192.168.2.7171.22.30.1704971619892816766 09/28/22-04:12:02.248719TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497161989192.168.2.7171.22.30.170
                                171.22.30.170192.168.2.71989497292841753 09/28/22-04:13:08.192973TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)198949729171.22.30.170192.168.2.7
                                171.22.30.170192.168.2.71989497142841753 09/28/22-04:11:48.761471TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)198949714171.22.30.170192.168.2.7
                                171.22.30.170192.168.2.71989497322841753 09/28/22-04:13:50.237286TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)198949732171.22.30.170192.168.2.7
                                192.168.2.7171.22.30.1704971419892816766 09/28/22-04:11:48.872256TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497141989192.168.2.7171.22.30.170
                                171.22.30.170192.168.2.71989497312841753 09/28/22-04:13:20.783532TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)198949731171.22.30.170192.168.2.7
                                192.168.2.7171.22.30.1704971519892816766 09/28/22-04:11:55.135716TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497151989192.168.2.7171.22.30.170
                                TimestampSource PortDest PortSource IPDest IP
                                Sep 28, 2022 04:11:47.216166973 CEST497141989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:11:47.244659901 CEST198949714171.22.30.170192.168.2.7
                                Sep 28, 2022 04:11:47.244803905 CEST497141989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:11:47.480103970 CEST497141989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:11:47.561458111 CEST198949714171.22.30.170192.168.2.7
                                Sep 28, 2022 04:11:47.841763973 CEST497141989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:11:48.081073046 CEST198949714171.22.30.170192.168.2.7
                                Sep 28, 2022 04:11:48.761471033 CEST198949714171.22.30.170192.168.2.7
                                Sep 28, 2022 04:11:48.872256041 CEST497141989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:11:48.970669985 CEST198949714171.22.30.170192.168.2.7
                                Sep 28, 2022 04:11:49.853272915 CEST497141989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:11:54.296312094 CEST497151989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:11:54.323734999 CEST198949715171.22.30.170192.168.2.7
                                Sep 28, 2022 04:11:54.323832989 CEST497151989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:11:54.324443102 CEST497151989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:11:54.454488039 CEST198949715171.22.30.170192.168.2.7
                                Sep 28, 2022 04:11:55.135715961 CEST497151989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:11:55.257941961 CEST198949715171.22.30.170192.168.2.7
                                Sep 28, 2022 04:11:56.283302069 CEST497151989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:12:00.608197927 CEST497161989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:12:00.635656118 CEST198949716171.22.30.170192.168.2.7
                                Sep 28, 2022 04:12:00.635793924 CEST497161989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:12:00.636326075 CEST497161989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:12:00.711595058 CEST198949716171.22.30.170192.168.2.7
                                Sep 28, 2022 04:12:01.263540983 CEST497161989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:12:01.411520004 CEST198949716171.22.30.170192.168.2.7
                                Sep 28, 2022 04:12:02.248718977 CEST497161989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:12:02.411017895 CEST198949716171.22.30.170192.168.2.7
                                Sep 28, 2022 04:12:03.264863014 CEST497161989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:12:07.453716993 CEST497181989192.168.2.7171.22.30.97
                                Sep 28, 2022 04:12:10.477433920 CEST497181989192.168.2.7171.22.30.97
                                Sep 28, 2022 04:12:16.587308884 CEST497181989192.168.2.7171.22.30.97
                                Sep 28, 2022 04:12:28.212622881 CEST497191989192.168.2.7171.22.30.97
                                Sep 28, 2022 04:12:31.197839975 CEST497191989192.168.2.7171.22.30.97
                                Sep 28, 2022 04:12:37.198277950 CEST497191989192.168.2.7171.22.30.97
                                Sep 28, 2022 04:12:49.280534029 CEST497281989192.168.2.7171.22.30.97
                                Sep 28, 2022 04:12:52.387058973 CEST497281989192.168.2.7171.22.30.97
                                Sep 28, 2022 04:12:58.387623072 CEST497281989192.168.2.7171.22.30.97
                                Sep 28, 2022 04:13:08.045222998 CEST497291989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:08.072586060 CEST198949729171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:08.072699070 CEST497291989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:08.073422909 CEST497291989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:08.192972898 CEST198949729171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:08.341450930 CEST497291989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:08.724486113 CEST198949729171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:08.736243010 CEST497291989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:08.776987076 CEST198949729171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:08.931526899 CEST497291989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:08.998291969 CEST497291989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:13.241271019 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:13.268585920 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:13.268773079 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:13.269579887 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:13.442826033 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:13.998595953 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:14.138187885 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:14.545727015 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:14.546179056 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:14.573961973 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:14.599947929 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:14.739052057 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:14.999475956 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.136562109 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.207856894 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.207937956 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.207983971 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.208033085 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.208065033 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.208122969 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.235377073 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.235421896 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.235445976 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.235471964 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.235495090 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.235518932 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.235543966 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.235569954 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.235621929 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.235687971 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.263062000 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.263102055 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.263119936 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.263139009 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.263158083 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.263175964 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.263194084 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.263212919 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.263231039 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.263248920 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.263267040 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.263283968 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.263290882 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.263300896 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.263319016 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.263336897 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.263401985 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.263453960 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.290501118 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290541887 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290563107 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290581942 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290600061 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290617943 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290635109 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290640116 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.290654898 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290677071 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290683985 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.290695906 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290697098 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.290710926 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.290716887 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290735006 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290752888 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290771961 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290772915 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.290791035 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290795088 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.290807962 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290826082 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290826082 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.290843964 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290862083 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290864944 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.290896893 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290916920 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290935993 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290950060 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.290955067 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290973902 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290977955 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.290992022 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.290996075 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.291054964 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.318521976 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.318562984 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.318587065 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.318610907 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.318634987 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.318655014 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.318658113 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.318684101 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.318695068 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.318707943 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.318716049 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.318733931 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.318756104 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.318758011 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.318782091 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.318795919 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.318804979 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.318830013 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.318851948 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.318870068 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.318892002 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.318897963 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.318929911 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.318954945 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.318978071 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.318995953 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.319000006 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319022894 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319036007 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.319045067 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319060087 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.319067955 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319091082 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319117069 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319128990 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.319140911 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319155931 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.319164991 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319195032 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319226027 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319235086 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.319259882 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319262028 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.319284916 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319308996 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319320917 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.319331884 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319355965 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319377899 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.319379091 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319402933 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319422960 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.319425106 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319449902 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319468021 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.319473982 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319497108 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319516897 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.319520950 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319545031 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319566965 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319586039 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.319591045 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319611073 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.319613934 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319638014 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319659948 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319680929 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.319685936 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319709063 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.319709063 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319734097 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.319753885 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.319756985 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.320574999 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.347090006 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347136974 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347157001 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347174883 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347193956 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347217083 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347235918 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347254038 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347271919 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347290039 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347307920 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347326040 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347342968 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347361088 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347583055 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.347583055 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.347583055 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.347583055 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.347719908 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347758055 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347783089 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347807884 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347831964 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347832918 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.347857952 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347882032 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347893953 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.347904921 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347929001 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347935915 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.347953081 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347976923 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.347976923 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.348000050 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348009109 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.348022938 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348047018 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348068953 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348073959 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.348092079 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348115921 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348126888 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.348139048 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348165035 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348167896 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.348189116 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348201990 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.348213911 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348237991 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348262072 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.348262072 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348287106 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348313093 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348319054 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.348336935 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348361969 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348366976 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.348390102 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348392010 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.348414898 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348439932 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348448992 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.348464966 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348489046 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348507881 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.348514080 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348539114 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348543882 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.348562002 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348586082 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.348589897 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.348661900 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.353765965 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.375734091 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.375773907 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.375839949 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.375849962 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.375865936 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.375895023 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.375905037 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.375926971 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.375973940 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.375997066 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.375996113 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.376020908 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376077890 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376121044 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376131058 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.376131058 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.376148939 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376173019 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376202106 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.376220942 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.376226902 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376250029 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376274109 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376302958 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.376316071 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376339912 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376362085 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376378059 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376396894 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376414061 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376435995 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376465082 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376487970 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376511097 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376553059 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.376554966 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376596928 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376624107 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.376636028 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376660109 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376683950 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376724005 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.376724958 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376744032 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.376763105 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376785994 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376812935 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.376825094 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376847982 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376873970 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.376887083 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376909971 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376933098 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376971960 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.376975060 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.376992941 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.377016068 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.377029896 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.377029896 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.377038002 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.377060890 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.377078056 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.377082109 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.377104998 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.377125978 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.377130985 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.377149105 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.377170086 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.377171040 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.377192020 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.377233028 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.405237913 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405272961 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405365944 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405385017 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405404091 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405424118 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405441999 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405446053 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.405462980 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405482054 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405499935 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405519962 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405538082 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405555010 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405564070 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.405564070 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.405575037 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405586958 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.405595064 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405612946 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405632019 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405649900 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405668020 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405668020 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.405668020 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.405689001 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405704021 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405719042 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405738115 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405751944 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405766010 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405780077 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405793905 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405812979 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405826092 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405841112 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405848980 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.405848980 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.405848980 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.405859947 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405874968 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405890942 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405909061 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.405910969 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405930042 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405949116 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405962944 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405981064 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.405981064 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.405981064 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.405994892 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.406008005 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.406012058 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.406025887 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.406044960 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.406063080 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.406080008 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.406097889 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.406097889 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.406097889 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.406115055 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.406133890 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.406132936 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.406155109 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.406163931 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.406172991 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.406191111 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.406202078 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.406234026 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.433883905 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.433933020 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.433960915 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.433986902 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434012890 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434040070 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434053898 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.434067965 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434106112 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.434119940 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434145927 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.434156895 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434195042 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434209108 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.434228897 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434263945 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434274912 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.434300900 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434335947 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434349060 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.434370995 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434406042 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434441090 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434454918 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.434477091 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434489012 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.434511900 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434545994 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434556007 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.434581041 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434614897 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434649944 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434660912 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.434684992 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434694052 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.434721947 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.434772015 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:15.434775114 CEST198949730171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:15.482672930 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:16.055910110 CEST497301989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:20.643836021 CEST497311989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:20.678610086 CEST198949731171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:20.678926945 CEST497311989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:20.682928085 CEST497311989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:20.783531904 CEST198949731171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:20.827610970 CEST497311989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:21.410090923 CEST497311989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:25.973526001 CEST497321989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:26.000703096 CEST198949732171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:26.000984907 CEST497321989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:26.001482010 CEST497321989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:26.141622066 CEST198949732171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:28.288698912 CEST198949732171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:28.288968086 CEST497321989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:28.434674025 CEST198949732171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:28.835153103 CEST198949732171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:28.835879087 CEST497321989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:28.932065964 CEST198949732171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:29.105439901 CEST198949732171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:29.117167950 CEST497321989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:29.149656057 CEST198949732171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:29.155787945 CEST497321989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:29.183612108 CEST198949732171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:29.183736086 CEST497321989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:29.256184101 CEST198949732171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:29.256278992 CEST497321989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:29.432497978 CEST198949732171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:29.432594061 CEST497321989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:29.532272100 CEST198949732171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:31.826893091 CEST198949732171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:31.999679089 CEST497321989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:33.494821072 CEST198949732171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:33.687392950 CEST497321989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:37.729382038 CEST198949732171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:37.781380892 CEST497321989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:43.653090000 CEST198949732171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:43.703727007 CEST497321989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:43.731108904 CEST198949732171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:43.797451019 CEST497321989192.168.2.7171.22.30.170
                                Sep 28, 2022 04:13:50.237286091 CEST198949732171.22.30.170192.168.2.7
                                Sep 28, 2022 04:13:50.282743931 CEST497321989192.168.2.7171.22.30.170
                                TimestampSource PortDest PortSource IPDest IP
                                Sep 28, 2022 04:11:47.158247948 CEST6032653192.168.2.78.8.8.8
                                Sep 28, 2022 04:11:47.179531097 CEST53603268.8.8.8192.168.2.7
                                Sep 28, 2022 04:11:54.248167992 CEST5083553192.168.2.78.8.8.8
                                Sep 28, 2022 04:11:54.269999981 CEST53508358.8.8.8192.168.2.7
                                Sep 28, 2022 04:12:00.577048063 CEST5050553192.168.2.78.8.8.8
                                Sep 28, 2022 04:12:00.594331980 CEST53505058.8.8.8192.168.2.7
                                Sep 28, 2022 04:13:08.023263931 CEST6267953192.168.2.78.8.8.8
                                Sep 28, 2022 04:13:08.043982029 CEST53626798.8.8.8192.168.2.7
                                Sep 28, 2022 04:13:13.217652082 CEST6139253192.168.2.78.8.8.8
                                Sep 28, 2022 04:13:13.238759041 CEST53613928.8.8.8192.168.2.7
                                Sep 28, 2022 04:13:20.614382982 CEST5210453192.168.2.78.8.8.8
                                Sep 28, 2022 04:13:20.634161949 CEST53521048.8.8.8192.168.2.7
                                Sep 28, 2022 04:13:25.937551975 CEST6535653192.168.2.78.8.8.8
                                Sep 28, 2022 04:13:25.958398104 CEST53653568.8.8.8192.168.2.7
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Sep 28, 2022 04:11:47.158247948 CEST192.168.2.78.8.8.80x5858Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                Sep 28, 2022 04:11:54.248167992 CEST192.168.2.78.8.8.80xa4beStandard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                Sep 28, 2022 04:12:00.577048063 CEST192.168.2.78.8.8.80xb457Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                Sep 28, 2022 04:13:08.023263931 CEST192.168.2.78.8.8.80x1871Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                Sep 28, 2022 04:13:13.217652082 CEST192.168.2.78.8.8.80xf480Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                Sep 28, 2022 04:13:20.614382982 CEST192.168.2.78.8.8.80x35d3Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                Sep 28, 2022 04:13:25.937551975 CEST192.168.2.78.8.8.80xdcfbStandard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Sep 28, 2022 04:11:47.179531097 CEST8.8.8.8192.168.2.70x5858No error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false
                                Sep 28, 2022 04:11:54.269999981 CEST8.8.8.8192.168.2.70xa4beNo error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false
                                Sep 28, 2022 04:12:00.594331980 CEST8.8.8.8192.168.2.70xb457No error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false
                                Sep 28, 2022 04:13:08.043982029 CEST8.8.8.8192.168.2.70x1871No error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false
                                Sep 28, 2022 04:13:13.238759041 CEST8.8.8.8192.168.2.70xf480No error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false
                                Sep 28, 2022 04:13:20.634161949 CEST8.8.8.8192.168.2.70x35d3No error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false
                                Sep 28, 2022 04:13:25.958398104 CEST8.8.8.8192.168.2.70xdcfbNo error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:04:11:17
                                Start date:28/09/2022
                                Path:C:\Users\user\Desktop\Jens Frodesen CV.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\Jens Frodesen CV.exe"
                                Imagebase:0x930000
                                File size:1053184 bytes
                                MD5 hash:89197E451346ED5A3BA154F394948DE7
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.286466691.0000000003EF9000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.286466691.0000000003EF9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.286466691.0000000003EF9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.286466691.0000000003EF9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.290258767.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.290258767.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.290258767.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.290258767.00000000041C1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                Reputation:low

                                Target ID:1
                                Start time:04:11:38
                                Start date:28/09/2022
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmp476F.tmp
                                Imagebase:0x12c0000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:2
                                Start time:04:11:38
                                Start date:28/09/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6edaf0000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:3
                                Start time:04:11:38
                                Start date:28/09/2022
                                Path:C:\Users\user\Desktop\Jens Frodesen CV.exe
                                Wow64 process (32bit):true
                                Commandline:{path}
                                Imagebase:0x610000
                                File size:1053184 bytes
                                MD5 hash:89197E451346ED5A3BA154F394948DE7
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.544223992.0000000005DD0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.548893461.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.548893461.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.548893461.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.548893461.00000000070B0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.536015397.0000000003F25000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.518836400.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000000.278495402.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000000.278495402.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000003.00000000.278495402.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000000.278495402.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.526400449.0000000002E2B000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.526400449.0000000002E2B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.544737083.0000000006150000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.544737083.0000000006150000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.544737083.0000000006150000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.544737083.0000000006150000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.544737083.0000000006150000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.537384357.0000000004010000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.541798909.0000000005400000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.541798909.0000000005400000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.541798909.0000000005400000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.541798909.0000000005400000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.548537445.0000000007080000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.548537445.0000000007080000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.548537445.0000000007080000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.548537445.0000000007080000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.531321593.0000000003CDF000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.549029017.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.549029017.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.549029017.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.549029017.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.542986660.0000000005DC0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.542986660.0000000005DC0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.542986660.0000000005DC0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.542986660.0000000005DC0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.542226366.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.542226366.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.542226366.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.542226366.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.548413055.0000000007070000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.548413055.0000000007070000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.548413055.0000000007070000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.548413055.0000000007070000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.542387318.0000000005D70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.542387318.0000000005D70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.542387318.0000000005D70000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.542387318.0000000005D70000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000003.486665310.0000000006A38000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.542908530.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.542908530.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.542908530.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.542908530.0000000005DB0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.549521024.0000000007100000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.549521024.0000000007100000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.549521024.0000000007100000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.549521024.0000000007100000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.548343986.0000000007060000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.548343986.0000000007060000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.548343986.0000000007060000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.548343986.0000000007060000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.535141648.0000000003EAF000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.548639274.0000000007090000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.548639274.0000000007090000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.548639274.0000000007090000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.548639274.0000000007090000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                Reputation:low

                                Target ID:5
                                Start time:04:11:42
                                Start date:28/09/2022
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp7194.tmp
                                Imagebase:0x12c0000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:6
                                Start time:04:11:42
                                Start date:28/09/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6edaf0000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:8
                                Start time:04:11:43
                                Start date:28/09/2022
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp75AC.tmp
                                Imagebase:0x12c0000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:10
                                Start time:04:11:43
                                Start date:28/09/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6edaf0000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:12
                                Start time:04:11:44
                                Start date:28/09/2022
                                Path:C:\Users\user\Desktop\Jens Frodesen CV.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\Jens Frodesen CV.exe" 0
                                Imagebase:0xe80000
                                File size:1053184 bytes
                                MD5 hash:89197E451346ED5A3BA154F394948DE7
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Reputation:low

                                Target ID:14
                                Start time:04:11:45
                                Start date:28/09/2022
                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                                Imagebase:0xd30000
                                File size:1053184 bytes
                                MD5 hash:89197E451346ED5A3BA154F394948DE7
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Antivirus matches:
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 60%, ReversingLabs
                                • Detection: 57%, Virustotal, Browse
                                • Detection: 33%, Metadefender, Browse
                                Reputation:low

                                Target ID:20
                                Start time:04:11:51
                                Start date:28/09/2022
                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                Imagebase:0xe10000
                                File size:1053184 bytes
                                MD5 hash:89197E451346ED5A3BA154F394948DE7
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:.Net C# or VB.NET
                                Reputation:low

                                Target ID:22
                                Start time:04:12:09
                                Start date:28/09/2022
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmpBFFB.tmp
                                Imagebase:0x12c0000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:23
                                Start time:04:12:12
                                Start date:28/09/2022
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmpC1DF.tmp
                                Imagebase:0x12c0000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language

                                Target ID:24
                                Start time:04:12:12
                                Start date:28/09/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6edaf0000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language

                                Target ID:25
                                Start time:04:12:12
                                Start date:28/09/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6edaf0000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language

                                Target ID:27
                                Start time:04:12:13
                                Start date:28/09/2022
                                Path:C:\Users\user\Desktop\Jens Frodesen CV.exe
                                Wow64 process (32bit):false
                                Commandline:{path}
                                Imagebase:0xf0000
                                File size:1053184 bytes
                                MD5 hash:89197E451346ED5A3BA154F394948DE7
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language

                                Target ID:28
                                Start time:04:12:14
                                Start date:28/09/2022
                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Wow64 process (32bit):true
                                Commandline:{path}
                                Imagebase:0xfe0000
                                File size:1053184 bytes
                                MD5 hash:89197E451346ED5A3BA154F394948DE7
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000001C.00000002.411921875.0000000004408000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001C.00000002.405231773.0000000003391000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000001C.00000002.405231773.0000000003391000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000001C.00000002.405231773.0000000003391000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000001C.00000002.411534974.00000000043EF000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000001C.00000002.410904877.00000000043DB000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                                Target ID:29
                                Start time:04:12:14
                                Start date:28/09/2022
                                Path:C:\Users\user\Desktop\Jens Frodesen CV.exe
                                Wow64 process (32bit):true
                                Commandline:{path}
                                Imagebase:0xc70000
                                File size:1053184 bytes
                                MD5 hash:89197E451346ED5A3BA154F394948DE7
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001D.00000002.405844203.0000000003101000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000001D.00000002.405844203.0000000003101000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000001D.00000002.405844203.0000000003101000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                                Target ID:30
                                Start time:04:12:20
                                Start date:28/09/2022
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LrSEeB" /XML "C:\Users\user\AppData\Local\Temp\tmpE91E.tmp
                                Imagebase:0x12c0000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language

                                Target ID:31
                                Start time:04:12:21
                                Start date:28/09/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6edaf0000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language

                                Target ID:32
                                Start time:04:12:23
                                Start date:28/09/2022
                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Wow64 process (32bit):true
                                Commandline:{path}
                                Imagebase:0xd30000
                                File size:1053184 bytes
                                MD5 hash:89197E451346ED5A3BA154F394948DE7
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:.Net C# or VB.NET

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:10.9%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:88
                                  Total number of Limit Nodes:6
                                  execution_graph 11799 125bb30 GetCurrentProcess 11800 125bba3 11799->11800 11801 125bbaa GetCurrentThread 11799->11801 11800->11801 11802 125bbe7 GetCurrentProcess 11801->11802 11803 125bbe0 11801->11803 11804 125bc1d 11802->11804 11803->11802 11805 125bc45 GetCurrentThreadId 11804->11805 11806 125bc76 11805->11806 11807 12566d0 11808 12566ed 11807->11808 11811 12557d8 11808->11811 11810 12566fa 11812 12557e3 11811->11812 11815 1255818 11812->11815 11814 1256cd5 11814->11810 11816 1255823 11815->11816 11819 1256850 11816->11819 11818 1256dba 11818->11814 11820 125685b 11819->11820 11823 1256880 11820->11823 11822 1256eaa 11822->11818 11824 125688b 11823->11824 11826 12575be 11824->11826 11830 1259728 11824->11830 11834 1259738 11824->11834 11825 12575fc 11825->11822 11826->11825 11837 125b858 11826->11837 11831 1259738 11830->11831 11843 1259830 11831->11843 11832 1259747 11832->11826 11836 1259830 2 API calls 11834->11836 11835 1259747 11835->11826 11836->11835 11838 125b889 11837->11838 11839 125b8ad 11838->11839 11863 125b9d5 11838->11863 11868 125ba18 11838->11868 11872 125ba09 11838->11872 11839->11825 11844 1259843 11843->11844 11845 125985b 11844->11845 11851 1259aa8 11844->11851 11855 1259ab8 11844->11855 11845->11832 11846 1259853 11846->11845 11847 1259a58 GetModuleHandleW 11846->11847 11848 1259a85 11847->11848 11848->11832 11852 1259ab8 11851->11852 11854 1259af1 11852->11854 11859 12592f0 11852->11859 11854->11846 11856 1259acc 11855->11856 11857 1259af1 11856->11857 11858 12592f0 LoadLibraryExW 11856->11858 11857->11846 11858->11857 11860 1259c98 LoadLibraryExW 11859->11860 11862 1259d11 11860->11862 11862->11854 11864 125b9e2 11863->11864 11865 125ba12 11863->11865 11864->11839 11866 125ba5f 11865->11866 11876 125a4bc 11865->11876 11866->11839 11870 125ba25 11868->11870 11869 125ba5f 11869->11839 11870->11869 11871 125a4bc 2 API calls 11870->11871 11871->11869 11873 125ba12 11872->11873 11874 125ba5f 11873->11874 11875 125a4bc 2 API calls 11873->11875 11874->11839 11875->11874 11877 125a4c7 11876->11877 11879 125c350 11877->11879 11880 125a5a4 11877->11880 11879->11879 11881 125a5af 11880->11881 11882 1256880 2 API calls 11881->11882 11883 125c7bf 11882->11883 11887 125e548 11883->11887 11893 125e538 11883->11893 11884 125c7f8 11884->11879 11888 125e5c6 11887->11888 11890 125e579 11887->11890 11888->11884 11889 125e585 11889->11884 11890->11889 11899 125e880 11890->11899 11903 125e890 11890->11903 11895 125e579 11893->11895 11896 125e5c6 11893->11896 11894 125e585 11894->11884 11895->11894 11897 125e880 2 API calls 11895->11897 11898 125e890 2 API calls 11895->11898 11896->11884 11897->11896 11898->11896 11900 125e890 11899->11900 11901 1259830 LoadLibraryExW GetModuleHandleW 11900->11901 11902 125e899 11901->11902 11902->11888 11904 1259830 LoadLibraryExW GetModuleHandleW 11903->11904 11905 125e899 11904->11905 11905->11888 11906 125bd58 DuplicateHandle 11907 125bdee 11906->11907

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 0125BB90
                                  • GetCurrentThread.KERNEL32 ref: 0125BBCD
                                  • GetCurrentProcess.KERNEL32 ref: 0125BC0A
                                  • GetCurrentThreadId.KERNEL32 ref: 0125BC63
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.281420902.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1250000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: 8ef7218da3c84381b142f753448a7610d36022269ce479f03049cd648f9fdaaf
                                  • Instruction ID: 0576ff1fffa95902fe56eb7c707364b1bc8fbc98837302623bb8e7f13f24fbaf
                                  • Opcode Fuzzy Hash: 8ef7218da3c84381b142f753448a7610d36022269ce479f03049cd648f9fdaaf
                                  • Instruction Fuzzy Hash: 0D5174B0D00249DFDB14CFAAD588BDEBBF1EF48314F248459E819A7350D7746884CB65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 0125BB90
                                  • GetCurrentThread.KERNEL32 ref: 0125BBCD
                                  • GetCurrentProcess.KERNEL32 ref: 0125BC0A
                                  • GetCurrentThreadId.KERNEL32 ref: 0125BC63
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.281420902.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1250000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: e04bc6d82f417410ca069a5406070f45afb95bc27e65925f18211957629caf5d
                                  • Instruction ID: caeb6d23a6c47392bec5d6cfccae76374ed066bd9ecf5d1b3a2c1386f57a3373
                                  • Opcode Fuzzy Hash: e04bc6d82f417410ca069a5406070f45afb95bc27e65925f18211957629caf5d
                                  • Instruction Fuzzy Hash: E25163B0E00249CFDB14CFAAD588BDEBBF1EF48308F248459E919A7350D7756884CB69
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 01259A76
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.281420902.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1250000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 824e7ef05bfa8e7d2ed740def2e570742b15b84b6962f0ce3aaad6b1b43bcfbb
                                  • Instruction ID: ef611ffb87d7e47b2344a5b5845adec3d9ff615c6911fb066c29d9cb2c8ebb54
                                  • Opcode Fuzzy Hash: 824e7ef05bfa8e7d2ed740def2e570742b15b84b6962f0ce3aaad6b1b43bcfbb
                                  • Instruction Fuzzy Hash: 18714770A10B06CFDB64DF6AD48475ABBF1FF88208F008A2DD55AD7A40D775E845CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 98 125bd58-125bdec DuplicateHandle 99 125bdf5-125be12 98->99 100 125bdee-125bdf4 98->100 100->99
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0125BDDF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.281420902.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1250000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 1a2f15eb141c08647e1e3bc655ad736a95c8aaf48273c31427988e412155bc40
                                  • Instruction ID: cd1a43e2820905529e42512c97ff6576fb0eb118d7b37ef6ccc496462d1bec2c
                                  • Opcode Fuzzy Hash: 1a2f15eb141c08647e1e3bc655ad736a95c8aaf48273c31427988e412155bc40
                                  • Instruction Fuzzy Hash: D421E4B5900209AFDB10CFAAD884ADEFBF4FB48324F14801AE915A3310D374A944CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 103 12592f0-1259cd8 105 1259ce0-1259d0f LoadLibraryExW 103->105 106 1259cda-1259cdd 103->106 107 1259d11-1259d17 105->107 108 1259d18-1259d35 105->108 106->105 107->108
                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01259AF1,00000800,00000000,00000000), ref: 01259D02
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.281420902.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1250000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: e440fccaac7beadf61fa84b716bc6720041e76da04d376a83b09851381542c20
                                  • Instruction ID: 4fba331e53c011550cd9dbca709cabc4bd030926f356cbef64e9a8486891cfae
                                  • Opcode Fuzzy Hash: e440fccaac7beadf61fa84b716bc6720041e76da04d376a83b09851381542c20
                                  • Instruction Fuzzy Hash: 8711E4B6914209DFDB10CF9AD884BDEFBF4EB88364F14842AD919A7200C375A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 111 1259a10-1259a50 112 1259a52-1259a55 111->112 113 1259a58-1259a83 GetModuleHandleW 111->113 112->113 114 1259a85-1259a8b 113->114 115 1259a8c-1259aa0 113->115 114->115
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 01259A76
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.281420902.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1250000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 18ec16ae0c14d4b315e99391f2c80b373005715bef76aa11ad5d671f1939aeeb
                                  • Instruction ID: ceeb56b300090ec9de0736c6f479a2cc8e8fb083755efd0a26758fb16d2515fa
                                  • Opcode Fuzzy Hash: 18ec16ae0c14d4b315e99391f2c80b373005715bef76aa11ad5d671f1939aeeb
                                  • Instruction Fuzzy Hash: 5B11C0B5D00249CBDF10CF9AD484BDEFBF4AB88224F14851AD969A7600C379A545CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.281092433.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_11ed000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5f3f4b12f35f1fdfd088369577af67e6ac8986e220835637084cf6d9d7ad06ff
                                  • Instruction ID: 7221f3bcde253cbc1a1d0fef452f33a2c81f17cbe78c0419839e1e64b719075e
                                  • Opcode Fuzzy Hash: 5f3f4b12f35f1fdfd088369577af67e6ac8986e220835637084cf6d9d7ad06ff
                                  • Instruction Fuzzy Hash: 822148B1504604DFDF09CF94E8C8B66BBA5FB98324F24C569E9094B607C336E846C7A2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.281146591.00000000011FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_11fd000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 519e7f7d7ea042bc8aee11901f4c5706f052410fa0ae4a1f76525fa35562bf0c
                                  • Instruction ID: cc30d0b865b4b32ac4d14d080d22df8e3033ee23d3f8cb08f36e13f01e5eb7de
                                  • Opcode Fuzzy Hash: 519e7f7d7ea042bc8aee11901f4c5706f052410fa0ae4a1f76525fa35562bf0c
                                  • Instruction Fuzzy Hash: B42125B1504204DFDF19CF54E8C4B26BB65FB88354F24C66DDA094B246C336D847CA62
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.281146591.00000000011FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_11fd000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c9720131469b6f950b7035f9eda001498aaaad5f3edd7d79e8b75f907e3f2dc6
                                  • Instruction ID: 5be2d6bbdf4e7c7c307534c54bb6b0016830f117e5914aaed2779965da3f9767
                                  • Opcode Fuzzy Hash: c9720131469b6f950b7035f9eda001498aaaad5f3edd7d79e8b75f907e3f2dc6
                                  • Instruction Fuzzy Hash: F5212CB5504204DFDF09CF94E9C4B36BB65FB84324F24C56DEA094B246C336D846CBA2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.281146591.00000000011FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_11fd000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7c2b72f2b54ff745439c65828ffb8fbb6d8abb5fca9eb3cba9e2e478cd5faed8
                                  • Instruction ID: 0a6dcffbb633bf242c09f9dadff9b6c217e6f1ceb1d83c65b56a24c4e64593a8
                                  • Opcode Fuzzy Hash: 7c2b72f2b54ff745439c65828ffb8fbb6d8abb5fca9eb3cba9e2e478cd5faed8
                                  • Instruction Fuzzy Hash: 2721CF754083808FCB07CF24D990B15BF71EB46214F28C6EEC8488B667C33A980ACB62
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.281092433.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_11ed000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b7cc86b5ff79ce043c803af90b915b5d7a1ca48b01667a36e239ea52a940d4d9
                                  • Instruction ID: df95d68a02aa5f53e2dbab3ac8432801e73ec7bfff94d56de4d24c636af3a932
                                  • Opcode Fuzzy Hash: b7cc86b5ff79ce043c803af90b915b5d7a1ca48b01667a36e239ea52a940d4d9
                                  • Instruction Fuzzy Hash: 5811B1B6404680CFDF16CF54E9C4B56BFB1FB94324F28C6A9D8450BA16C336E456CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.281146591.00000000011FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_11fd000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4e48e4748a45bc7b91dcd6aa8ebc28c847b65a88b089b38da77094b7edb9447c
                                  • Instruction ID: cf7767cef8ac2cd944fd88bb510189cf52f072a80e4efc745f9b09dfc024650d
                                  • Opcode Fuzzy Hash: 4e48e4748a45bc7b91dcd6aa8ebc28c847b65a88b089b38da77094b7edb9447c
                                  • Instruction Fuzzy Hash: 3211BE79504280DFDF06CF54D5C4B25BB71FB84224F24C6AED9494B656C33AD44ACB92
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.281092433.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_11ed000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a8e938d90e78e8d3e9dce2ca1745cd1ec1770a0f3f9928f6717d612d72773020
                                  • Instruction ID: 63e55a95505985b3c8e64d8bcb48686d4511650eb930e1cd3d76a2f007f24c50
                                  • Opcode Fuzzy Hash: a8e938d90e78e8d3e9dce2ca1745cd1ec1770a0f3f9928f6717d612d72773020
                                  • Instruction Fuzzy Hash: 1E014C71808B849EEB144BD5DCC8766FBD8DF4123CF09851AEE094B247C3349444C7B2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.281092433.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_11ed000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 006558d83c4f24dc29ee7b83ec7f309e2064d3554a7746f80320020b51662b5d
                                  • Instruction ID: 49edcd505fa4de9faa5f9383bbc7b2874482a287790f9e0f4c46b4b853e6adc0
                                  • Opcode Fuzzy Hash: 006558d83c4f24dc29ee7b83ec7f309e2064d3554a7746f80320020b51662b5d
                                  • Instruction Fuzzy Hash: 44F0C2714046849EEB158F5ADCC8B62FFE8EB81338F18C45AED084B287C3799844CBB1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.281420902.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1250000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 736aac44d75c30d67bdf72f62a07282a2bc435bfd653407caa6cd7d47ce2bf33
                                  • Instruction ID: a82b58009639a228a0b6fdb7ff86ce28ed38754ea062239520f796824c41f7de
                                  • Opcode Fuzzy Hash: 736aac44d75c30d67bdf72f62a07282a2bc435bfd653407caa6cd7d47ce2bf33
                                  • Instruction Fuzzy Hash: 2812C4F1CD17468AD712DF65E8983A97BA0F7863A8FD04B08D2613BAD0D7B4116ACF44
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.281420902.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1250000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1cc058c031e0953848f10d4805e3b8866f2a5c0b98a5758395aad2d7245e617c
                                  • Instruction ID: 2e0bb9f50fcae73fcc363c77f117bc4b84e02b8d954c0f97f8f02beafdca1b19
                                  • Opcode Fuzzy Hash: 1cc058c031e0953848f10d4805e3b8866f2a5c0b98a5758395aad2d7245e617c
                                  • Instruction Fuzzy Hash: 67A18432E2021ACFCF15DFA5C8845EDBBB6FF85300B15856AED05BB221EB71A955CB40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.281420902.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1250000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6efc351e565eba3e670c393319888c7fb365c4d918c63e4a55b4b4e814757c9a
                                  • Instruction ID: e289af1a012dd82f0e51a8216e75ff21d1fbacd8d92c174db26519c495fb2ad9
                                  • Opcode Fuzzy Hash: 6efc351e565eba3e670c393319888c7fb365c4d918c63e4a55b4b4e814757c9a
                                  • Instruction Fuzzy Hash: 92C138F1CD17468BD712DF65E8883997BA1FB863A8F904B08D2613B6D0D7B4146ACF84
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Execution Graph

                                  Execution Coverage:11.8%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:121
                                  Total number of Limit Nodes:7
                                  execution_graph 26563 f9fbf8 26564 f9fc60 CreateWindowExW 26563->26564 26566 f9fd1c 26564->26566 26566->26566 26599 f96758 26602 f96344 26599->26602 26601 f96766 26603 f9634f 26602->26603 26606 f96394 26603->26606 26605 f9688d 26605->26601 26607 f9639f 26606->26607 26610 f963c4 26607->26610 26609 f96962 26609->26605 26611 f963cf 26610->26611 26614 f963f4 26611->26614 26613 f96a62 26613->26609 26616 f963ff 26614->26616 26615 f971bc 26615->26613 26616->26615 26618 f9b406 26616->26618 26619 f9b429 26618->26619 26620 f9b44d 26619->26620 26623 f9b5a9 26619->26623 26627 f9b5b8 26619->26627 26620->26615 26624 f9b5b8 26623->26624 26626 f9b5ff 26624->26626 26631 f9a0ec 26624->26631 26626->26620 26628 f9b5c5 26627->26628 26629 f9b5ff 26628->26629 26630 f9a0ec 5 API calls 26628->26630 26629->26620 26630->26629 26632 f9a0f7 26631->26632 26634 f9c2f8 26632->26634 26635 f9b904 26632->26635 26634->26634 26636 f9b90f 26635->26636 26637 f9c367 26636->26637 26638 f963f4 5 API calls 26636->26638 26645 f9c3d1 26637->26645 26651 f9c3e0 26637->26651 26638->26637 26639 f9c375 26641 f9e0d8 LoadLibraryExW GetModuleHandleW 26639->26641 26642 f9e0f0 LoadLibraryExW GetModuleHandleW 26639->26642 26640 f9c3a0 26640->26634 26641->26640 26642->26640 26646 f9c40e 26645->26646 26648 f9c437 26646->26648 26650 f9c4df 26646->26650 26657 f9b9a0 26646->26657 26649 f9c4da KiUserCallbackDispatcher 26648->26649 26648->26650 26649->26650 26652 f9c40e 26651->26652 26653 f9c437 26652->26653 26654 f9b9a0 GetFocus 26652->26654 26656 f9c4df 26652->26656 26655 f9c4da KiUserCallbackDispatcher 26653->26655 26653->26656 26654->26653 26655->26656 26658 f9b9ab 26657->26658 26659 f9ba14 GetFocus 26658->26659 26660 f9c9f5 26658->26660 26659->26660 26660->26648 26661 65433b0 26662 65433b9 26661->26662 26666 6543438 26662->26666 26671 6543428 26662->26671 26663 65433ea 26667 654343d 26666->26667 26676 6543470 26667->26676 26681 6543461 26667->26681 26668 6543454 26668->26663 26672 6543438 26671->26672 26674 6543470 DnsQuery_A 26672->26674 26675 6543461 DnsQuery_A 26672->26675 26673 6543454 26673->26663 26674->26673 26675->26673 26677 654348e 26676->26677 26678 65434b6 26677->26678 26686 6543578 26677->26686 26690 6543569 26677->26690 26678->26668 26682 6543470 26681->26682 26683 65434b6 26682->26683 26684 6543578 DnsQuery_A 26682->26684 26685 6543569 DnsQuery_A 26682->26685 26683->26668 26684->26682 26685->26682 26687 65435a1 26686->26687 26694 6541adc 26687->26694 26691 6543578 26690->26691 26692 6541adc DnsQuery_A 26691->26692 26693 65435e2 26692->26693 26693->26677 26695 65437f0 DnsQuery_A 26694->26695 26697 654392a 26695->26697 26706 f9bdc1 26707 f9bd84 DuplicateHandle 26706->26707 26709 f9bdcf 26706->26709 26708 f9bd96 26707->26708 26567 f992f0 26571 f993d9 26567->26571 26579 f993e8 26567->26579 26568 f992ff 26572 f993fb 26571->26572 26574 f99413 26572->26574 26587 f99670 26572->26587 26591 f99660 26572->26591 26573 f9940b 26573->26574 26575 f99610 GetModuleHandleW 26573->26575 26574->26568 26576 f9963d 26575->26576 26576->26568 26580 f993fb 26579->26580 26581 f99413 26580->26581 26585 f99670 LoadLibraryExW 26580->26585 26586 f99660 LoadLibraryExW 26580->26586 26581->26568 26582 f9940b 26582->26581 26583 f99610 GetModuleHandleW 26582->26583 26584 f9963d 26583->26584 26584->26568 26585->26582 26586->26582 26588 f99684 26587->26588 26590 f996a9 26588->26590 26595 f98768 26588->26595 26590->26573 26593 f99670 26591->26593 26592 f996a9 26592->26573 26593->26592 26594 f98768 LoadLibraryExW 26593->26594 26594->26592 26596 f99850 LoadLibraryExW 26595->26596 26598 f998c9 26596->26598 26598->26590 26698 f9b6d0 GetCurrentProcess 26699 f9b74a GetCurrentThread 26698->26699 26700 f9b743 26698->26700 26701 f9b780 26699->26701 26702 f9b787 GetCurrentProcess 26699->26702 26700->26699 26701->26702 26705 f9b7bd 26702->26705 26703 f9b7e5 GetCurrentThreadId 26704 f9b816 26703->26704 26705->26703 26710 f9fe40 SetWindowLongW 26711 f9feac 26710->26711
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.545270459.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6540000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9fa1c99908f109422ed20c0c75f071ef267533c6be9131c363566bdede124ca6
                                  • Instruction ID: bdac9f01e1393c2332c34fedc66a5c800f356b641911e56ca1e1f14c041a152d
                                  • Opcode Fuzzy Hash: 9fa1c99908f109422ed20c0c75f071ef267533c6be9131c363566bdede124ca6
                                  • Instruction Fuzzy Hash: 1D51F378E01208DFDB04DFA4D999AEDBBB2FB89314F10802AE805B73A5DB346945CF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.545270459.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6540000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cf3a7fad64e3520439a170833e555854b23fd7c83b6bab9f9dd974f7a545c38a
                                  • Instruction ID: 74ea1c77a0e10aee41570728ca91f30917370281669e139953d47f3d337c3281
                                  • Opcode Fuzzy Hash: cf3a7fad64e3520439a170833e555854b23fd7c83b6bab9f9dd974f7a545c38a
                                  • Instruction Fuzzy Hash: D5110430E162148FDB45AFB9E5497EDBFB0FB8B21AF0494ABD004B3281CB344445CB69
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.545270459.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6540000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 96d2a6963e78c708d416337d2b5632b4f053cecd23558b1cb7174c993076c437
                                  • Instruction ID: 09e5ee7a3d8321b91b3179458ab38c57de2daa817cc1506c66c614d9bf7344d1
                                  • Opcode Fuzzy Hash: 96d2a6963e78c708d416337d2b5632b4f053cecd23558b1cb7174c993076c437
                                  • Instruction Fuzzy Hash: C301BC30E112048FDB059FB8E1593ECBFB0BB8A302F14646AD044B3241DB344495CB68
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.545270459.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6540000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 63e67a18a46f91a71ca8da587a3e02222c662a8dfcb140a103f97b59277ae1a0
                                  • Instruction ID: fbed31fba50a38e22211059b8bafb199176a9e2eca1c7813b25bad7f2c7e666d
                                  • Opcode Fuzzy Hash: 63e67a18a46f91a71ca8da587a3e02222c662a8dfcb140a103f97b59277ae1a0
                                  • Instruction Fuzzy Hash: E5F0AF30E112189FDB44AFA9E5497EDBFB4FB8E316F14A46AE004B3281DB344954CB69
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 135 f9b6c0-f9b741 GetCurrentProcess 136 f9b74a-f9b77e GetCurrentThread 135->136 137 f9b743-f9b749 135->137 138 f9b780-f9b786 136->138 139 f9b787-f9b7bb GetCurrentProcess 136->139 137->136 138->139 140 f9b7bd-f9b7c3 139->140 141 f9b7c4-f9b7df call f9bc88 139->141 140->141 145 f9b7e5-f9b814 GetCurrentThreadId 141->145 146 f9b81d-f9b87f 145->146 147 f9b816-f9b81c 145->147 147->146
                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 00F9B730
                                  • GetCurrentThread.KERNEL32 ref: 00F9B76D
                                  • GetCurrentProcess.KERNEL32 ref: 00F9B7AA
                                  • GetCurrentThreadId.KERNEL32 ref: 00F9B803
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.517359198.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_f90000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: 6aed5be007274f3524bb59920e5697c2399da72199d1280992f16f9dfde51411
                                  • Instruction ID: 8363bc932feb642af5262fb599d88aaa68342307ffdf2ce5f5af6ae0f507f483
                                  • Opcode Fuzzy Hash: 6aed5be007274f3524bb59920e5697c2399da72199d1280992f16f9dfde51411
                                  • Instruction Fuzzy Hash: 1C5163B0D002498FDB10CFA9E688BDEBBF0EF88314F24855AE419B7251C7759945CF66
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 154 f9b6d0-f9b741 GetCurrentProcess 155 f9b74a-f9b77e GetCurrentThread 154->155 156 f9b743-f9b749 154->156 157 f9b780-f9b786 155->157 158 f9b787-f9b7bb GetCurrentProcess 155->158 156->155 157->158 159 f9b7bd-f9b7c3 158->159 160 f9b7c4-f9b7df call f9bc88 158->160 159->160 164 f9b7e5-f9b814 GetCurrentThreadId 160->164 165 f9b81d-f9b87f 164->165 166 f9b816-f9b81c 164->166 166->165
                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 00F9B730
                                  • GetCurrentThread.KERNEL32 ref: 00F9B76D
                                  • GetCurrentProcess.KERNEL32 ref: 00F9B7AA
                                  • GetCurrentThreadId.KERNEL32 ref: 00F9B803
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.517359198.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_f90000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: 1134206320e523c984d0dd785894241a4312c6a8a009cf8c43a076f73f3c7fa1
                                  • Instruction ID: fca004009271b6ba55e04077604aea34bfbbd82abf033c86c62b011fe8e0bfba
                                  • Opcode Fuzzy Hash: 1134206320e523c984d0dd785894241a4312c6a8a009cf8c43a076f73f3c7fa1
                                  • Instruction Fuzzy Hash: EB5143B0D002598FDB14CFAAE688BDEBBF1AF88314F248559E419B7350C7756844CF66
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 173 f993e8-f993fd call f98704 176 f993ff 173->176 177 f99413-f99417 173->177 226 f99405 call f99670 176->226 227 f99405 call f99660 176->227 178 f99419-f99423 177->178 179 f9942b-f9946c 177->179 178->179 184 f99479-f99487 179->184 185 f9946e-f99476 179->185 180 f9940b-f9940d 180->177 181 f99548-f99608 180->181 221 f9960a-f9960d 181->221 222 f99610-f9963b GetModuleHandleW 181->222 187 f99489-f9948e 184->187 188 f994ab-f994ad 184->188 185->184 189 f99499 187->189 190 f99490-f99497 call f98710 187->190 191 f994b0-f994b7 188->191 193 f9949b-f994a9 189->193 190->193 194 f994b9-f994c1 191->194 195 f994c4-f994cb 191->195 193->191 194->195 198 f994d8-f994e1 call f98720 195->198 199 f994cd-f994d5 195->199 204 f994ee-f994f3 198->204 205 f994e3-f994eb 198->205 199->198 206 f99511-f99515 204->206 207 f994f5-f994fc 204->207 205->204 228 f99518 call f99968 206->228 229 f99518 call f99967 206->229 207->206 208 f994fe-f9950e call f98730 call f98740 207->208 208->206 211 f9951b-f9951e 214 f99541-f99547 211->214 215 f99520-f9953e 211->215 215->214 221->222 223 f9963d-f99643 222->223 224 f99644-f99658 222->224 223->224 226->180 227->180 228->211 229->211
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00F9962E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.517359198.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_f90000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID: HR$HR
                                  • API String ID: 4139908857-4037001784
                                  • Opcode ID: a489732cc94e32a0817fab8903ebbcaf630d4238156eb9a6baf98d157069ff80
                                  • Instruction ID: d1839f1686412517bddf1e7b5e66918759261105f8e279f609c68d595bcdcb99
                                  • Opcode Fuzzy Hash: a489732cc94e32a0817fab8903ebbcaf630d4238156eb9a6baf98d157069ff80
                                  • Instruction Fuzzy Hash: 05714670A04B058FEB24DF29D4417AAB7F1FF88314F118A2ED48AD7A50DB75E846CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 473 6543738-6543754 474 6543756-6543767 473->474 475 654376a-65437cb 473->475 484 65437a8-65437d7 475->484 485 65437d9-6543863 475->485 490 6543865-654386f 485->490 491 654389c-65438cf 485->491 490->491 493 6543871-6543873 490->493 500 65438d7-6543928 DnsQuery_A 491->500 496 6543875-654387f 493->496 497 6543896-6543899 493->497 498 6543881 496->498 499 6543883-6543892 496->499 497->491 498->499 499->499 501 6543894 499->501 502 6543931-654397e 500->502 503 654392a-6543930 500->503 501->497 508 6543980-6543984 502->508 509 654398e-6543992 502->509 503->502 508->509 512 6543986 508->512 510 6543994-6543997 509->510 511 65439a1-65439a5 509->511 510->511 513 65439b6 511->513 514 65439a7-65439b3 511->514 512->509 516 65439b7 513->516 514->513 516->516
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.545270459.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6540000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6fbcc93c22db6946500f1b3fb6adc53af445fc364ffeea456e3e6203bf00e033
                                  • Instruction ID: 4f8db8fb04661be86bd6a871b16e342e098e9035bbba7fc638b099599ed3b91b
                                  • Opcode Fuzzy Hash: 6fbcc93c22db6946500f1b3fb6adc53af445fc364ffeea456e3e6203bf00e033
                                  • Instruction Fuzzy Hash: 778188B1D04209CFDB10DFAAC8806DEFBB1FF89318F10852AD815AB260DB75A945CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 517 65437e4-6543863 519 6543865-654386f 517->519 520 654389c-65438cf 517->520 519->520 521 6543871-6543873 519->521 527 65438d7-6543928 DnsQuery_A 520->527 523 6543875-654387f 521->523 524 6543896-6543899 521->524 525 6543881 523->525 526 6543883-6543892 523->526 524->520 525->526 526->526 528 6543894 526->528 529 6543931-654397e 527->529 530 654392a-6543930 527->530 528->524 535 6543980-6543984 529->535 536 654398e-6543992 529->536 530->529 535->536 539 6543986 535->539 537 6543994-6543997 536->537 538 65439a1-65439a5 536->538 537->538 540 65439b6 538->540 541 65439a7-65439b3 538->541 539->536 543 65439b7 540->543 541->540 543->543
                                  APIs
                                  • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06543918
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.545270459.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6540000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: Query_
                                  • String ID:
                                  • API String ID: 428220571-0
                                  • Opcode ID: 50aa0d133429f5fc613f8ad3547451ab2f1976ee167d88b8aa5cb0a8535e5ecc
                                  • Instruction ID: d608d8419f97ebfae1b56208ad875d23df843c8aa31ead6e172a000373e4beed
                                  • Opcode Fuzzy Hash: 50aa0d133429f5fc613f8ad3547451ab2f1976ee167d88b8aa5cb0a8535e5ecc
                                  • Instruction Fuzzy Hash: FD5123B1D002589FDB14DFA9C984BDDBBB1FF48318F14812AE819AB250DB75A846CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 544 6541adc-6543863 547 6543865-654386f 544->547 548 654389c-6543928 DnsQuery_A 544->548 547->548 549 6543871-6543873 547->549 557 6543931-654397e 548->557 558 654392a-6543930 548->558 551 6543875-654387f 549->551 552 6543896-6543899 549->552 553 6543881 551->553 554 6543883-6543892 551->554 552->548 553->554 554->554 556 6543894 554->556 556->552 563 6543980-6543984 557->563 564 654398e-6543992 557->564 558->557 563->564 567 6543986 563->567 565 6543994-6543997 564->565 566 65439a1-65439a5 564->566 565->566 568 65439b6 566->568 569 65439a7-65439b3 566->569 567->564 571 65439b7 568->571 569->568 571->571
                                  APIs
                                  • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06543918
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.545270459.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6540000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: Query_
                                  • String ID:
                                  • API String ID: 428220571-0
                                  • Opcode ID: 90219efdf59c6efc312f8d9eda6dd5890a2fe6cdaca866dbe2540e424660e17f
                                  • Instruction ID: a18495c6bedc3cf0321f746d1752b640aae5fcbe7ab8956dca7d43144b310ae5
                                  • Opcode Fuzzy Hash: 90219efdf59c6efc312f8d9eda6dd5890a2fe6cdaca866dbe2540e424660e17f
                                  • Instruction Fuzzy Hash: A75134B1C046589FDB14DFAAC884BDEBBB1FF48318F108129E814AB250DB75A845CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 572 f9fbec-f9fc5e 573 f9fc69-f9fc70 572->573 574 f9fc60-f9fc66 572->574 575 f9fc7b-f9fcb3 573->575 576 f9fc72-f9fc78 573->576 574->573 577 f9fcbb-f9fd1a CreateWindowExW 575->577 576->575 578 f9fd1c-f9fd22 577->578 579 f9fd23-f9fd5b 577->579 578->579 583 f9fd68 579->583 584 f9fd5d-f9fd60 579->584 585 f9fd69 583->585 584->583 585->585
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00F9FD0A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.517359198.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_f90000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: fb2434acf5784e1bec2ee1505118a16d9fa06d57dcfa331943c07ad978d030e4
                                  • Instruction ID: a21e9aca512391ae9f7e196954b3bf98b55247fbbfa1ecff4f54685f98f0ee2a
                                  • Opcode Fuzzy Hash: fb2434acf5784e1bec2ee1505118a16d9fa06d57dcfa331943c07ad978d030e4
                                  • Instruction Fuzzy Hash: A151AFB1D00249DFDF14CF99D884ADEBBB5FF88354F24812AE819AB210D775A945CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 586 f9fbf8-f9fc5e 587 f9fc69-f9fc70 586->587 588 f9fc60-f9fc66 586->588 589 f9fc7b-f9fd1a CreateWindowExW 587->589 590 f9fc72-f9fc78 587->590 588->587 592 f9fd1c-f9fd22 589->592 593 f9fd23-f9fd5b 589->593 590->589 592->593 597 f9fd68 593->597 598 f9fd5d-f9fd60 593->598 599 f9fd69 597->599 598->597 599->599
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00F9FD0A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.517359198.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_f90000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: b44dfa431670e4498a787962c258e5d455a10118413c3bfaef8367767c44718e
                                  • Instruction ID: 2978351887e9d6c17c2e9283ad56c2513f1761a3d4536dae00ab19b9f6462c6d
                                  • Opcode Fuzzy Hash: b44dfa431670e4498a787962c258e5d455a10118413c3bfaef8367767c44718e
                                  • Instruction Fuzzy Hash: 7841AFB1D00349DFDF14CF99C884ADEBBB5BF88354F24812AE819AB210D775A945CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 600 f9bdc1-f9bdcd 601 f9bdcf-f9bddb 600->601 602 f9bd84-f9bd94 DuplicateHandle 600->602 603 f9bde6-f9beee 601->603 604 f9bd9d-f9bdba 602->604 605 f9bd96-f9bd9c 602->605 605->604
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00F9BD87
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.517359198.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_f90000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: c448a2ec2054993c1efc089329e6a103718470b3d24be5cdeb93a377002a0136
                                  • Instruction ID: 82630cb7fd9ab6ff87b17d72a8df87ee39314cfb8fd4aeaabb5326150afbc4f1
                                  • Opcode Fuzzy Hash: c448a2ec2054993c1efc089329e6a103718470b3d24be5cdeb93a377002a0136
                                  • Instruction Fuzzy Hash: B931BC38A40748CFE7019F30FA487A93BB2E78A706F00422AE9498B796CB741944DF11
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00F9BD87
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.517359198.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_f90000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 7edd247b98e4f4c1538412e6cfb1c9fd317d40d8b88f79ff978f2c6d63655183
                                  • Instruction ID: 2d90c1fe3e85e79f59d19eee4b3d18d5ca372201e88b3003aa1a744a14e35205
                                  • Opcode Fuzzy Hash: 7edd247b98e4f4c1538412e6cfb1c9fd317d40d8b88f79ff978f2c6d63655183
                                  • Instruction Fuzzy Hash: 8E21E4B5D00248AFDB10CFA9D584ADEFBF4EB48324F14801AE918A7310C379A945CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00F9BD87
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.517359198.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_f90000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 95cccd21858c43b82ff5548e734b65f8a48f3c453ca6ad485b53c31f56048bc0
                                  • Instruction ID: 28dcf413cb1ec2525ad6d4a78a3c71e0b031d6cb854cfd366b4ea6077de5c0e1
                                  • Opcode Fuzzy Hash: 95cccd21858c43b82ff5548e734b65f8a48f3c453ca6ad485b53c31f56048bc0
                                  • Instruction Fuzzy Hash: DB21C6B5D002499FDB10CF99D584ADEFBF4EB48324F14841AE955A3310D378A944CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00F996A9,00000800,00000000,00000000), ref: 00F998BA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.517359198.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_f90000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 6dbd957a80991117bc6639ae604c8727871b9881dfcb5304b7eea14f96fedd95
                                  • Instruction ID: 839c4f7976832a4db831f0cf36c9ff606c92c733c219f339b8041ce75825c1de
                                  • Opcode Fuzzy Hash: 6dbd957a80991117bc6639ae604c8727871b9881dfcb5304b7eea14f96fedd95
                                  • Instruction Fuzzy Hash: 801144B2C042089FDB10CF9AC444BDEFBF4EB49324F05842ED519A7600C3B5A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00F996A9,00000800,00000000,00000000), ref: 00F998BA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.517359198.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_f90000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: e875997715bd812d1f13cc2b73f11220cca00e1fc6f534d831c4339e42a213ae
                                  • Instruction ID: bb57632f7e74dbc0e9270bc90f92525254fed873e969ee1ae61656150b15855f
                                  • Opcode Fuzzy Hash: e875997715bd812d1f13cc2b73f11220cca00e1fc6f534d831c4339e42a213ae
                                  • Instruction Fuzzy Hash: F41126B2C002099FDB10CF9AD444BDEFBF4EB49324F05842ED419A7600C379AA45CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00F9962E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.517359198.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_f90000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 20fdadd9836744a358247d748aca24be6da081af9806a9171a0491c16bc5376c
                                  • Instruction ID: 0ae1e8a522b29bc4f75a018b3e940ac7dcdbad17543715649f377cfc03c06b82
                                  • Opcode Fuzzy Hash: 20fdadd9836744a358247d748aca24be6da081af9806a9171a0491c16bc5376c
                                  • Instruction Fuzzy Hash: 3011E0B6C042498FDB20CF9AD444BDEFBF4EF88324F15842AD419A7600C3B9A545CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetWindowLongW.USER32(?,?,?), ref: 00F9FE9D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.517359198.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_f90000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: LongWindow
                                  • String ID:
                                  • API String ID: 1378638983-0
                                  • Opcode ID: bf1fdd34e51fffbead8b7b193ef5e19c8bad9e2a848ad0e78279a9a365002ba0
                                  • Instruction ID: 93a79a40051b5e1b6c629afed3b6773eee116b44f20ad3d8583750b455a6ac26
                                  • Opcode Fuzzy Hash: bf1fdd34e51fffbead8b7b193ef5e19c8bad9e2a848ad0e78279a9a365002ba0
                                  • Instruction Fuzzy Hash: 871103B5C002499FDB10DF99D484BDEFBF4EB48324F10841AD959A7201C375A945CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetWindowLongW.USER32(?,?,?), ref: 00F9FE9D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.517359198.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_f90000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID: LongWindow
                                  • String ID:
                                  • API String ID: 1378638983-0
                                  • Opcode ID: c2faf1edf831b9880b07b73ea8e839d7d1ca0f2b567266e6cb46044cb289b3b3
                                  • Instruction ID: ae1b78f017cd9c4bebde0f1696ef193f3ae2bf236b8d1bf125bd14f1fe32a4ae
                                  • Opcode Fuzzy Hash: c2faf1edf831b9880b07b73ea8e839d7d1ca0f2b567266e6cb46044cb289b3b3
                                  • Instruction Fuzzy Hash: CD1112B5C002489FDB10DF9AD488BDEFBF8EB48324F10841AD919A3300C378A944CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.516305235.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_edd000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c04a4a39c2d7eb23fb22106af24d3c85dc7112ca78e9495c53896f1be904b174
                                  • Instruction ID: 0260350ddf6dddfc71b6d998061883730a722dd17ea54fc2ba4a9b4c7beb5d3e
                                  • Opcode Fuzzy Hash: c04a4a39c2d7eb23fb22106af24d3c85dc7112ca78e9495c53896f1be904b174
                                  • Instruction Fuzzy Hash: 4F2137B1508244DFDB11CF54EDC0F66BF65FB98328F24856AE9095B306C336D856CBA2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.516522310.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_eed000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6ad8888853db55b5594ddd40a6a9d05fa9fa4850b07dc2f68ea83bf56929597c
                                  • Instruction ID: fa9da1b3a4e1e490069d4b47d6e123ea7d68a6fb8f1879e724a7e6a7acdf39e5
                                  • Opcode Fuzzy Hash: 6ad8888853db55b5594ddd40a6a9d05fa9fa4850b07dc2f68ea83bf56929597c
                                  • Instruction Fuzzy Hash: 9A2134B1508388DFCB10CF11DCC4B66BB66FB88328F28C969D8095B246C33BD847CA61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.516522310.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_eed000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 26f3863f6d13e3a3c82d5b816e8ff929d87c2a6d25caf12fb8ebde86ac4440a1
                                  • Instruction ID: 5deeee28b4bb55744393200aa8aaaa702cb0c4f5eb15eb5674788189be1e3c28
                                  • Opcode Fuzzy Hash: 26f3863f6d13e3a3c82d5b816e8ff929d87c2a6d25caf12fb8ebde86ac4440a1
                                  • Instruction Fuzzy Hash: 3021807550D3C48FDB02CF24D994715BF72EB46314F28C5EAD8498B697C33A984ACB62
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.516305235.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_edd000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b7cc86b5ff79ce043c803af90b915b5d7a1ca48b01667a36e239ea52a940d4d9
                                  • Instruction ID: 791b3a90309bc50a763157073216ff9f765edb2656db00908100bd925b206e8b
                                  • Opcode Fuzzy Hash: b7cc86b5ff79ce043c803af90b915b5d7a1ca48b01667a36e239ea52a940d4d9
                                  • Instruction Fuzzy Hash: 6511B176808280DFDB12CF14E9C4B56BF71FB84328F2486AAD8051B716C336D856CBA2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.545270459.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6540000_Jens Frodesen CV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 84a8709ddd94724b8cb0a094ffba4c276dab0ec1852bf378de6eadc730987069
                                  • Instruction ID: 60fe4bc29326d463a858fa76c5600c51abbcf901ae4cf2ddbab4cc3feb3a99bb
                                  • Opcode Fuzzy Hash: 84a8709ddd94724b8cb0a094ffba4c276dab0ec1852bf378de6eadc730987069
                                  • Instruction Fuzzy Hash: 0CE0B635E15218ABCB40EFE8F5948EDB771FB8A265F006066E519B3201CB305854CF58
                                  Uniqueness

                                  Uniqueness Score: -1.00%