Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
attached PI.exe

Overview

General Information

Sample Name:attached PI.exe
Analysis ID:711673
MD5:238b41e834f3b663584d4788493bc75f
SHA1:006efa65c3a4c5b4ee2402ab5e6d789fc95e0b9c
SHA256:e0b3c7281dd3488df3c71ee35dde8fe321e5aae4d3f200d2f63dfef64a97daff
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • attached PI.exe (PID: 1604 cmdline: "C:\Users\user\Desktop\attached PI.exe" MD5: 238B41E834F3B663584D4788493BC75F)
    • schtasks.exe (PID: 3836 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmpE760.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6068 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • attached PI.exe (PID: 3092 cmdline: {path} MD5: 238B41E834F3B663584D4788493BC75F)
    • attached PI.exe (PID: 4748 cmdline: {path} MD5: 238B41E834F3B663584D4788493BC75F)
      • schtasks.exe (PID: 4648 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpD63A.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 2904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5328 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpD9B5.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • attached PI.exe (PID: 5344 cmdline: "C:\Users\user\Desktop\attached PI.exe" 0 MD5: 238B41E834F3B663584D4788493BC75F)
    • schtasks.exe (PID: 5072 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmp6181.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 1236 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • attached PI.exe (PID: 5216 cmdline: {path} MD5: 238B41E834F3B663584D4788493BC75F)
    • attached PI.exe (PID: 2192 cmdline: {path} MD5: 238B41E834F3B663584D4788493BC75F)
  • dhcpmon.exe (PID: 4596 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: 238B41E834F3B663584D4788493BC75F)
    • schtasks.exe (PID: 6132 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmp6CEB.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 4460 cmdline: {path} MD5: 238B41E834F3B663584D4788493BC75F)
  • dhcpmon.exe (PID: 4812 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: 238B41E834F3B663584D4788493BC75F)
    • schtasks.exe (PID: 5920 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmp8C89.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5184 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 2620 cmdline: {path} MD5: 238B41E834F3B663584D4788493BC75F)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "fba1bbc6-2cc8-4c94-b6c0-dda5a12f", "Group": "Default", "Domain1": "brightnano1.ddns.net", "Domain2": "", "Port": 1989, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x16e3:$x1: NanoCore.ClientPluginHost
  • 0x171c:$x2: IClientNetworkHost
0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x16e3:$x2: NanoCore.ClientPluginHost
  • 0x1800:$s4: PipeCreated
  • 0x16fd:$s5: IClientLoggingHost
0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x175f:$x2: NanoCore.ClientPlugin
  • 0x16e3:$x3: NanoCore.ClientPluginHost
  • 0x1775:$i3: IClientNetwork
  • 0x16fd:$i6: IClientLoggingHost
  • 0x171c:$i7: IClientNetworkHost
  • 0x1491:$s1: ClientPlugin
  • 0x1768:$s1: ClientPlugin
0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x16e3:$a1: NanoCore.ClientPluginHost
  • 0x175f:$a2: NanoCore.ClientPlugin
  • 0x16fd:$b9: IClientLoggingHost
0000000A.00000002.574582318.0000000003E61000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x27b0b:$a1: NanoCore.ClientPluginHost
  • 0x27ae2:$a2: NanoCore.ClientPlugin
  • 0x2cb36:$b7: LogClientException
  • 0x27af8:$b9: IClientLoggingHost
Click to see the 105 entries
SourceRuleDescriptionAuthorStrings
10.2.attached PI.exe.7280000.26.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x59eb:$x1: NanoCore.ClientPluginHost
  • 0x5b48:$x2: IClientNetworkHost
10.2.attached PI.exe.7280000.26.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x59eb:$x2: NanoCore.ClientPluginHost
  • 0x6941:$s3: PipeExists
  • 0x5be1:$s4: PipeCreated
  • 0x5a05:$s5: IClientLoggingHost
10.2.attached PI.exe.7280000.26.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x5ad5:$x2: NanoCore.ClientPlugin
  • 0x59eb:$x3: NanoCore.ClientPluginHost
  • 0x5aeb:$i3: IClientNetwork
  • 0x5a24:$i5: IClientDataHost
  • 0x5a05:$i6: IClientLoggingHost
  • 0x5b48:$i7: IClientNetworkHost
  • 0x5a43:$i8: IClientUIHost
  • 0x6955:$i9: IClientNameObjectCollection
  • 0x54fc:$s1: ClientPlugin
  • 0x5ade:$s1: ClientPlugin
  • 0x6971:$s6: get_ClientSettings
10.2.attached PI.exe.7280000.26.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x59eb:$a1: NanoCore.ClientPluginHost
  • 0x5ad5:$a2: NanoCore.ClientPlugin
  • 0x732e:$b7: LogClientException
  • 0x6941:$b8: PipeExists
  • 0x5a05:$b9: IClientLoggingHost
10.2.attached PI.exe.40c4695.11.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x605:$x1: NanoCore.ClientPluginHost
  • 0x3bd6:$x1: NanoCore.ClientPluginHost
  • 0x63e:$x2: IClientNetworkHost
Click to see the 268 entries

AV Detection

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\attached PI.exe, ProcessId: 4748, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

E-Banking Fraud

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\attached PI.exe, ProcessId: 4748, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Persistence and Installation Behavior

barindex
Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmpE760.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmpE760.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\attached PI.exe" , ParentImage: C:\Users\user\Desktop\attached PI.exe, ParentProcessId: 1604, ParentProcessName: attached PI.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmpE760.tmp, ProcessId: 3836, ProcessName: schtasks.exe

Stealing of Sensitive Information

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\attached PI.exe, ProcessId: 4748, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Remote Access Functionality

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\attached PI.exe, ProcessId: 4748, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
Timestamp:192.168.2.4171.22.30.1704970119892816766 09/28/22-12:05:02.686443
SID:2816766
Source Port:49701
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704970319892025019 09/28/22-12:05:22.049360
SID:2025019
Source Port:49703
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704970819892816766 09/28/22-12:06:01.338770
SID:2816766
Source Port:49708
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704971119892816766 09/28/22-12:06:22.172077
SID:2816766
Source Port:49711
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704970719892025019 09/28/22-12:05:54.025166
SID:2025019
Source Port:49707
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704971319892025019 09/28/22-12:06:32.627748
SID:2025019
Source Port:49713
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704970619892816718 09/28/22-12:05:48.890995
SID:2816718
Source Port:49706
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704970919892025019 09/28/22-12:06:06.469048
SID:2025019
Source Port:49709
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704971019892816766 09/28/22-12:06:14.491368
SID:2816766
Source Port:49710
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704970419892025019 09/28/22-12:05:33.183062
SID:2025019
Source Port:49704
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704970419892816766 09/28/22-12:05:33.986316
SID:2816766
Source Port:49704
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704971019892025019 09/28/22-12:06:13.098552
SID:2025019
Source Port:49710
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704971319892816766 09/28/22-12:06:34.136588
SID:2816766
Source Port:49713
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704971419892025019 09/28/22-12:06:40.121067
SID:2025019
Source Port:49714
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:171.22.30.170192.168.2.41989497142841753 09/28/22-12:07:00.176130
SID:2841753
Source Port:1989
Destination Port:49714
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704970819892025019 09/28/22-12:06:00.252868
SID:2025019
Source Port:49708
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704971119892025019 09/28/22-12:06:19.288235
SID:2025019
Source Port:49711
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704970619892816766 09/28/22-12:05:48.890995
SID:2816766
Source Port:49706
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704970119892025019 09/28/22-12:05:00.703490
SID:2025019
Source Port:49701
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704970319892816766 09/28/22-12:05:23.115950
SID:2816766
Source Port:49703
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:171.22.30.170192.168.2.41989497052810290 09/28/22-12:05:40.491149
SID:2810290
Source Port:1989
Destination Port:49705
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704970519892025019 09/28/22-12:05:40.016972
SID:2025019
Source Port:49705
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704971219892025019 09/28/22-12:06:26.713238
SID:2025019
Source Port:49712
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704971219892816766 09/28/22-12:06:27.481705
SID:2816766
Source Port:49712
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704970219892025019 09/28/22-12:05:11.687415
SID:2025019
Source Port:49702
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704970219892816766 09/28/22-12:05:12.780673
SID:2816766
Source Port:49702
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704970519892816766 09/28/22-12:05:41.772448
SID:2816766
Source Port:49705
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704970619892025019 09/28/22-12:05:47.986712
SID:2025019
Source Port:49706
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.4171.22.30.1704970919892816766 09/28/22-12:06:07.869293
SID:2816766
Source Port:49709
Destination Port:1989
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: attached PI.exeReversingLabs: Detection: 28%
Source: brightnano1.ddns.netAvira URL Cloud: Label: malware
Source: brightnano1.ddns.netVirustotal: Detection: 13%Perma Link
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 28%
Source: C:\Users\user\AppData\Roaming\ecCUXmnB.exeReversingLabs: Detection: 28%
Source: Yara matchFile source: 10.2.attached PI.exe.59a0000.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 21.2.attached PI.exe.447060c.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 21.2.attached PI.exe.447060c.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 21.2.attached PI.exe.446b7d6.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.attached PI.exe.4011550.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 21.2.attached PI.exe.4474c35.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.attached PI.exe.4011550.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.59a0000.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.0.attached PI.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.59a4629.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.3febfa5.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.40005d2.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.4005ffe.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.attached PI.exe.4180a00.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000018.00000002.449651846.00000000034A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000A.00000000.324119603.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000A.00000002.583841977.00000000059A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.330758176.0000000003F59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000015.00000002.442688511.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.331952602.000000000409E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000015.00000002.445813095.0000000004429000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: attached PI.exe PID: 1604, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: attached PI.exe PID: 4748, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: attached PI.exe PID: 2192, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4460, type: MEMORYSTR
Source: attached PI.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\ecCUXmnB.exeJoe Sandbox ML: detected
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
Source: 10.2.attached PI.exe.59a0000.18.unpackAvira: Label: TR/NanoCore.fadte
Source: 10.0.attached PI.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 00000018.00000002.449651846.00000000034A1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "fba1bbc6-2cc8-4c94-b6c0-dda5a12f", "Group": "Default", "Domain1": "brightnano1.ddns.net", "Domain2": "", "Port": 1989, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
Source: attached PI.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: attached PI.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.588135016.0000000007250000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.588307356.0000000007270000.00000004.08000000.00040000.00000000.sdmp, attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.588486274.0000000007290000.00000004.08000000.00040000.00000000.sdmp, attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: attached PI.exe, 0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.588382533.0000000007280000.00000004.08000000.00040000.00000000.sdmp, attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.588238329.0000000007260000.00000004.08000000.00040000.00000000.sdmp
Source: C:\Users\user\Desktop\attached PI.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h3_2_04F76718

Networking

barindex
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49701 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49701 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49702 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49702 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49703 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49703 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49704 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49704 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49705 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 171.22.30.170:1989 -> 192.168.2.4:49705
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49705 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49706 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49706 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.4:49706 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49707 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49708 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49708 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49709 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49709 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49710 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49710 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49711 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49711 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49712 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49712 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49713 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49713 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49714 -> 171.22.30.170:1989
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 171.22.30.170:1989 -> 192.168.2.4:49714
Source: Malware configuration extractorURLs:
Source: Malware configuration extractorURLs: brightnano1.ddns.net
Source: unknownDNS query: name: brightnano1.ddns.net
Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
Source: global trafficTCP traffic: 192.168.2.4:49701 -> 171.22.30.170:1989
Source: attached PI.exe, 00000003.00000003.289662678.000000000160D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.wI
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.588382533.0000000007280000.00000004.08000000.00040000.00000000.sdmp, attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://google.com
Source: attached PI.exe, 00000003.00000002.328075400.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000F.00000002.403498358.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000010.00000002.409484512.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000011.00000002.431572900.000000000281D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
Source: attached PI.exe, 00000003.00000003.297991182.0000000005F49000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
Source: attached PI.exe, 00000003.00000003.297020606.0000000005F49000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.296598172.0000000005F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/
Source: attached PI.exe, 00000003.00000003.297334590.0000000005F4A000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.297020606.0000000005F49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/deDn:Pg
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
Source: attached PI.exe, 00000003.00000003.297434096.0000000005F7D000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.297581397.0000000005F7D000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.297534861.0000000005F7D000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.297508471.0000000005F7D000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.297455091.0000000005F7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
Source: attached PI.exe, 00000003.00000003.297020606.0000000005F49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
Source: attached PI.exe, 00000003.00000003.297334590.0000000005F4A000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.297020606.0000000005F49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF2muP
Source: attached PI.exe, 00000003.00000003.297991182.0000000005F49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFVm)P
Source: attached PI.exe, 00000003.00000003.297334590.0000000005F4A000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.297020606.0000000005F49000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.297991182.0000000005F49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comL.TTF;mzP
Source: attached PI.exe, 00000003.00000003.297991182.0000000005F49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comTTFd_m
Source: attached PI.exe, 00000003.00000003.325653593.0000000005F40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comaen
Source: attached PI.exe, 00000003.00000003.297991182.0000000005F49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comals
Source: attached PI.exe, 00000003.00000003.297991182.0000000005F49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comals)m
Source: attached PI.exe, 00000003.00000003.297020606.0000000005F49000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.297991182.0000000005F49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
Source: attached PI.exe, 00000003.00000003.297020606.0000000005F49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comnn
Source: attached PI.exe, 00000003.00000003.325653593.0000000005F40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.como
Source: attached PI.exe, 00000003.00000003.297991182.0000000005F49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comsiefMm
Source: attached PI.exe, 00000003.00000003.297020606.0000000005F49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comtoed
Source: attached PI.exe, 00000003.00000003.290249380.0000000005F64000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290309072.0000000005F64000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290425292.0000000005F5B000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290289127.0000000005F5B000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290232356.0000000005F5B000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290377873.0000000005F5B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
Source: attached PI.exe, 00000003.00000003.290289127.0000000005F5B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com(O
Source: attached PI.exe, 00000003.00000003.290309072.0000000005F64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.come
Source: attached PI.exe, 00000003.00000003.290249380.0000000005F64000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290309072.0000000005F64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comn-u
Source: attached PI.exe, 00000003.00000003.292838602.0000000005F7D000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.293361358.0000000005F49000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.292992929.0000000005F44000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.293345954.0000000005F44000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
Source: attached PI.exe, 00000003.00000003.293345954.0000000005F44000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
Source: attached PI.exe, 00000003.00000003.293345954.0000000005F44000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/-
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: attached PI.exe, 00000003.00000003.289958917.0000000005F5B000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
Source: attached PI.exe, 00000003.00000003.290001259.0000000005F63000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290249380.0000000005F64000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290309072.0000000005F64000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290366189.0000000005F64000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290043716.0000000005F64000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290206189.0000000005F64000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.289958917.0000000005F5B000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290142745.0000000005F64000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290177451.0000000005F64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comn-uX0
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
Source: attached PI.exe, 00000003.00000003.291895691.0000000005F49000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
Source: attached PI.exe, 00000003.00000003.291895691.0000000005F49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krendDo;P
Source: attached PI.exe, 00000003.00000003.291895691.0000000005F49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krntaD/
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290734249.0000000005F5B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
Source: attached PI.exe, 00000003.00000003.290754999.0000000005F5B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comSO
Source: attached PI.exe, 00000003.00000003.290754999.0000000005F5B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comn7OgPF
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
Source: attached PI.exe, 00000003.00000003.297991182.0000000005F49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
Source: attached PI.exe, 00000003.00000003.296598172.0000000005F48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deF
Source: attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
Source: unknownDNS traffic detected: queries for: brightnano1.ddns.net
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

E-Banking Fraud

barindex
Source: Yara matchFile source: 10.2.attached PI.exe.59a0000.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 21.2.attached PI.exe.447060c.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 21.2.attached PI.exe.447060c.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 21.2.attached PI.exe.446b7d6.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.attached PI.exe.4011550.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 21.2.attached PI.exe.4474c35.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.attached PI.exe.4011550.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.59a0000.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.0.attached PI.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.59a4629.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.3febfa5.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.40005d2.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.4005ffe.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.attached PI.exe.4180a00.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000018.00000002.449651846.00000000034A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000A.00000000.324119603.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000A.00000002.583841977.00000000059A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.330758176.0000000003F59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000015.00000002.442688511.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.331952602.000000000409E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000015.00000002.445813095.0000000004429000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: attached PI.exe PID: 1604, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: attached PI.exe PID: 4748, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: attached PI.exe PID: 2192, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4460, type: MEMORYSTR

System Summary

barindex
Source: 10.2.attached PI.exe.7280000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.7280000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.7280000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.40c4695.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.40c4695.11.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.40c4695.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.7250000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.7250000.23.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.7250000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.5530000.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.5530000.16.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.5530000.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.59a0000.18.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.59a0000.18.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.59a0000.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.7260000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.7260000.24.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.7260000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.2eebe04.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.2eebe04.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.3febfa5.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.2eebe04.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.3febfa5.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.3febfa5.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.7280000.26.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.7280000.26.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.7280000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.40aa63e.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.40aa63e.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.40aa63e.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.7260000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.7260000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.7260000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.72d0000.32.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.72d0000.32.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.72d0000.32.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.41b379e.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.41b379e.14.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.41b379e.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.41aa96f.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.41aa96f.15.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.41aa96f.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 24.2.dhcpmon.exe.3509658.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 24.2.dhcpmon.exe.3509658.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 24.2.dhcpmon.exe.3509658.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.3e6e5cf.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.3e6e5cf.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.3e6e5cf.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.7270000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.7270000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.7270000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.41c1bce.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 21.2.attached PI.exe.447060c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.41c1bce.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.41c1bce.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 21.2.attached PI.exe.447060c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 21.2.attached PI.exe.447060c.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.7290000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.7290000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.7290000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.72d0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.72d0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.72d0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 21.2.attached PI.exe.447060c.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 21.2.attached PI.exe.447060c.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 21.2.attached PI.exe.447060c.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.41aa96f.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.41aa96f.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.41aa96f.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 10.2.attached PI.exe.41aa96f.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.4005ffe.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.4005ffe.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.4005ffe.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 21.2.attached PI.exe.348954c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 21.2.attached PI.exe.348954c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 21.2.attached PI.exe.348954c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 21.2.attached PI.exe.446b7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 21.2.attached PI.exe.446b7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 21.2.attached PI.exe.446b7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 21.2.attached PI.exe.446b7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.3e69930.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.3e69930.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.3e69930.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.6920000.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.6920000.20.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.6920000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.41c1bce.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.41c1bce.13.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.41c1bce.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.attached PI.exe.4011550.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.attached PI.exe.4011550.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.attached PI.exe.4011550.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.attached PI.exe.4011550.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.70c0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.70c0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.70c0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.7290000.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.7290000.27.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.7290000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.70f0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.70f0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.70f0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.2ef8080.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.2ef8080.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.2ef8080.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.6920000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.6920000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.6920000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.7250000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.7250000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.7250000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 21.2.attached PI.exe.4474c35.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 21.2.attached PI.exe.4474c35.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 21.2.attached PI.exe.4474c35.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.70c0000.21.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.70c0000.21.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.70c0000.21.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.3e69930.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.3e69930.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.3e69930.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.attached PI.exe.4011550.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.attached PI.exe.4011550.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.attached PI.exe.4011550.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.attached PI.exe.4011550.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.59a0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.59a0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.59a0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.0.attached PI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.0.attached PI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.0.attached PI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 10.0.attached PI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.72d4c9f.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.72d4c9f.30.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.72d4c9f.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.59a4629.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.59a4629.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.59a4629.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.3e781d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.3e781d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.3e781d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.2eb00ec.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.2eb00ec.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.2eb00ec.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 10.2.attached PI.exe.2eb00ec.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.40aa63e.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.40aa63e.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.40aa63e.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 10.2.attached PI.exe.40aa63e.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.4005ffe.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.2eebe04.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.2eebe04.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.2eebe04.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 10.2.attached PI.exe.2eebe04.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.40c4695.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.3febfa5.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.41b379e.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.2ef8080.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.40bec69.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.40c4695.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.40c4695.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 10.2.attached PI.exe.40c4695.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.2ef8080.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.2ef8080.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 10.2.attached PI.exe.2ef8080.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.3febfa5.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.3febfa5.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 10.2.attached PI.exe.3febfa5.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.40005d2.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 10.2.attached PI.exe.40bec69.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.40bec69.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 10.2.attached PI.exe.40bec69.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.41b379e.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.40005d2.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.40005d2.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 10.2.attached PI.exe.40005d2.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.4005ffe.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 10.2.attached PI.exe.4005ffe.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 10.2.attached PI.exe.4005ffe.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 10.2.attached PI.exe.41b379e.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.attached PI.exe.4180a00.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.attached PI.exe.4180a00.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.attached PI.exe.4180a00.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.attached PI.exe.4180a00.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000002.574582318.0000000003E61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000002.588566873.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000A.00000002.588566873.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 0000000A.00000002.588566873.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000018.00000002.449651846.00000000034A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000018.00000002.449651846.00000000034A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000002.589359423.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000A.00000002.589359423.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 0000000A.00000002.589359423.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000002.588307356.0000000007270000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000A.00000002.588307356.0000000007270000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 0000000A.00000002.588307356.0000000007270000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000000.324119603.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000A.00000000.324119603.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000A.00000000.324119603.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000002.587511631.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000A.00000002.587511631.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 0000000A.00000002.587511631.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000002.588382533.0000000007280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000A.00000002.588382533.0000000007280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 0000000A.00000002.588382533.0000000007280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000002.588486274.0000000007290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000A.00000002.588486274.0000000007290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 0000000A.00000002.588486274.0000000007290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000002.583841977.00000000059A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000A.00000002.583841977.00000000059A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 0000000A.00000002.583841977.00000000059A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000002.588135016.0000000007250000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000A.00000002.588135016.0000000007250000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 0000000A.00000002.588135016.0000000007250000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.330758176.0000000003F59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.330758176.0000000003F59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.330758176.0000000003F59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000015.00000002.442688511.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000015.00000002.442688511.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.331952602.000000000409E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.331952602.000000000409E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.331952602.000000000409E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000003.347369078.00000000066EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000002.583276687.0000000005530000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000A.00000002.583276687.0000000005530000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 0000000A.00000002.583276687.0000000005530000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000015.00000002.445813095.0000000004429000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000015.00000002.445813095.0000000004429000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000002.588238329.0000000007260000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000A.00000002.588238329.0000000007260000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 0000000A.00000002.588238329.0000000007260000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000002.588938112.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000A.00000002.588938112.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 0000000A.00000002.588938112.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000002.586982488.0000000006920000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000A.00000002.586982488.0000000006920000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 0000000A.00000002.586982488.0000000006920000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000002.588818445.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000A.00000002.588818445.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 0000000A.00000002.588818445.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: attached PI.exe PID: 1604, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: attached PI.exe PID: 1604, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: attached PI.exe PID: 1604, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: attached PI.exe PID: 4748, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: attached PI.exe PID: 4748, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: attached PI.exe PID: 4748, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: attached PI.exe PID: 2192, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: attached PI.exe PID: 2192, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: dhcpmon.exe PID: 4460, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: dhcpmon.exe PID: 4460, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: attached PI.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 10.2.attached PI.exe.7280000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7280000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7280000.26.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.7280000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.40c4695.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.40c4695.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.40c4695.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.40c4695.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.7250000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7250000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7250000.23.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.7250000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.5530000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.5530000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.5530000.16.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.5530000.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.59a0000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.59a0000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.59a0000.18.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.59a0000.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.7260000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7260000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7260000.24.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.7260000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.2eebe04.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.2eebe04.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.2eebe04.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.3febfa5.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.3febfa5.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.2eebe04.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.3febfa5.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.3febfa5.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.7280000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7280000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7280000.26.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.7280000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.40aa63e.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.40aa63e.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.40aa63e.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.40aa63e.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.7260000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7260000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7260000.24.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.7260000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.72d0000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.72d0000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.72d0000.32.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.72d0000.32.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.41b379e.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.41b379e.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.41b379e.14.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.41b379e.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.41aa96f.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.41aa96f.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.41aa96f.15.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.41aa96f.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 24.2.dhcpmon.exe.3509658.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 24.2.dhcpmon.exe.3509658.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 24.2.dhcpmon.exe.3509658.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 24.2.dhcpmon.exe.3509658.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.3e6e5cf.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.3e6e5cf.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.3e6e5cf.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.3e6e5cf.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.7270000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7270000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7270000.25.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.7270000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.41c1bce.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.41c1bce.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 21.2.attached PI.exe.447060c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 21.2.attached PI.exe.447060c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.41c1bce.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.41c1bce.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 21.2.attached PI.exe.447060c.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 21.2.attached PI.exe.447060c.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.7290000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7290000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7290000.27.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.7290000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.72d0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.72d0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.72d0000.32.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.72d0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 21.2.attached PI.exe.447060c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 21.2.attached PI.exe.447060c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 21.2.attached PI.exe.447060c.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 21.2.attached PI.exe.447060c.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.41aa96f.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.41aa96f.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.41aa96f.15.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.41aa96f.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 10.2.attached PI.exe.41aa96f.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.4005ffe.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.4005ffe.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.4005ffe.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.4005ffe.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 21.2.attached PI.exe.348954c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 21.2.attached PI.exe.348954c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 21.2.attached PI.exe.348954c.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 21.2.attached PI.exe.348954c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 21.2.attached PI.exe.446b7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 21.2.attached PI.exe.446b7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 21.2.attached PI.exe.446b7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 21.2.attached PI.exe.446b7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 21.2.attached PI.exe.446b7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.3e69930.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.3e69930.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.3e69930.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.3e69930.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.6920000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.6920000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.6920000.20.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.6920000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.41c1bce.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.41c1bce.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.41c1bce.13.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.41c1bce.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.attached PI.exe.4011550.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.attached PI.exe.4011550.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.attached PI.exe.4011550.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.attached PI.exe.4011550.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.attached PI.exe.4011550.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.70c0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.70c0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.70c0000.21.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.70c0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.7290000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7290000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7290000.27.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.7290000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.70f0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.70f0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.70f0000.22.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.70f0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.2ef8080.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.2ef8080.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.2ef8080.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.2ef8080.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.6920000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.6920000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.6920000.20.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.6920000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.7250000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7250000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.7250000.23.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.7250000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 21.2.attached PI.exe.4474c35.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 21.2.attached PI.exe.4474c35.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 21.2.attached PI.exe.4474c35.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 21.2.attached PI.exe.4474c35.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.70c0000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.70c0000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.70c0000.21.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.70c0000.21.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.3e69930.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.3e69930.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.3e69930.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.3e69930.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.attached PI.exe.4011550.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.attached PI.exe.4011550.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.attached PI.exe.4011550.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.attached PI.exe.4011550.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.attached PI.exe.4011550.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.59a0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.59a0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.59a0000.18.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.59a0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.0.attached PI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.0.attached PI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.0.attached PI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.0.attached PI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 10.0.attached PI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.72d4c9f.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.72d4c9f.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.72d4c9f.30.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.72d4c9f.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.59a4629.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.59a4629.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.59a4629.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.59a4629.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.3e781d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.3e781d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.3e781d4.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.3e781d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.2eb00ec.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.2eb00ec.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.2eb00ec.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 10.2.attached PI.exe.2eb00ec.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.40aa63e.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.40aa63e.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.40aa63e.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 10.2.attached PI.exe.40aa63e.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.4005ffe.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.2eebe04.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.2eebe04.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.2eebe04.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 10.2.attached PI.exe.2eebe04.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.40c4695.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.40c4695.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.3febfa5.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.41b379e.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.41b379e.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.2ef8080.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.40bec69.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.40bec69.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.40c4695.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.40c4695.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 10.2.attached PI.exe.40c4695.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.2ef8080.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.2ef8080.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 10.2.attached PI.exe.2ef8080.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.3febfa5.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.3febfa5.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 10.2.attached PI.exe.3febfa5.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.40005d2.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 10.2.attached PI.exe.40bec69.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.40bec69.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 10.2.attached PI.exe.40bec69.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.41b379e.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.40005d2.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.40005d2.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 10.2.attached PI.exe.40005d2.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.4005ffe.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 10.2.attached PI.exe.4005ffe.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 10.2.attached PI.exe.4005ffe.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 10.2.attached PI.exe.41b379e.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.attached PI.exe.4180a00.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.attached PI.exe.4180a00.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.attached PI.exe.4180a00.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.attached PI.exe.4180a00.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000002.574582318.0000000003E61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000002.588566873.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.588566873.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.588566873.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0000000A.00000002.588566873.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000018.00000002.449651846.00000000034A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000018.00000002.449651846.00000000034A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000002.589359423.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.589359423.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.589359423.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0000000A.00000002.589359423.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000002.588307356.0000000007270000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.588307356.0000000007270000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.588307356.0000000007270000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0000000A.00000002.588307356.0000000007270000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000000.324119603.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000000.324119603.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000A.00000000.324119603.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000002.587511631.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.587511631.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.587511631.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0000000A.00000002.587511631.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000002.588382533.0000000007280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.588382533.0000000007280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.588382533.0000000007280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0000000A.00000002.588382533.0000000007280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000002.588486274.0000000007290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.588486274.0000000007290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.588486274.0000000007290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0000000A.00000002.588486274.0000000007290000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000002.583841977.00000000059A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.583841977.00000000059A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.583841977.00000000059A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0000000A.00000002.583841977.00000000059A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000002.588135016.0000000007250000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.588135016.0000000007250000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.588135016.0000000007250000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0000000A.00000002.588135016.0000000007250000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.330758176.0000000003F59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.330758176.0000000003F59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.330758176.0000000003F59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000015.00000002.442688511.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000015.00000002.442688511.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.331952602.000000000409E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.331952602.000000000409E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.331952602.000000000409E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000003.347369078.00000000066EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000002.583276687.0000000005530000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.583276687.0000000005530000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.583276687.0000000005530000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0000000A.00000002.583276687.0000000005530000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000015.00000002.445813095.0000000004429000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000015.00000002.445813095.0000000004429000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000002.588238329.0000000007260000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.588238329.0000000007260000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.588238329.0000000007260000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0000000A.00000002.588238329.0000000007260000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000002.588938112.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.588938112.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.588938112.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0000000A.00000002.588938112.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000002.586982488.0000000006920000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.586982488.0000000006920000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.586982488.0000000006920000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0000000A.00000002.586982488.0000000006920000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000002.588818445.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.588818445.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000A.00000002.588818445.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0000000A.00000002.588818445.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: attached PI.exe PID: 1604, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: attached PI.exe PID: 1604, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: attached PI.exe PID: 1604, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: attached PI.exe PID: 1604, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: attached PI.exe PID: 4748, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: attached PI.exe PID: 4748, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: attached PI.exe PID: 4748, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: attached PI.exe PID: 5344, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: dhcpmon.exe PID: 4596, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: dhcpmon.exe PID: 4812, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: attached PI.exe PID: 2192, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: attached PI.exe PID: 2192, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: dhcpmon.exe PID: 4460, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: dhcpmon.exe PID: 4460, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_02EBE5C03_2_02EBE5C0
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_02EBE5B03_2_02EBE5B0
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_02EBBD143_2_02EBBD14
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_04F71DD03_2_04F71DD0
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_04F71DC13_2_04F71DC1
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_04F727A03_2_04F727A0
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_04F727903_2_04F72790
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_04F727103_2_04F72710
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_04F700EB3_2_04F700EB
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_04F700403_2_04F70040
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_04F700073_2_04F70007
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_04F7016B3_2_04F7016B
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_07777F703_2_07777F70
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_077747B03_2_077747B0
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_0777EFA83_2_0777EFA8
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_07775E583_2_07775E58
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_077766B03_2_077766B0
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_077739703_2_07773970
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_077700403_2_07770040
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_077770B03_2_077770B0
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_07772E503_2_07772E50
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_07774E483_2_07774E48
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_07775E483_2_07775E48
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_07778E303_2_07778E30
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_07774E383_2_07774E38
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_07778E213_2_07778E21
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_0777A6C03_2_0777A6C0
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_0777A6B33_2_0777A6B3
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_077766A03_2_077766A0
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_0777F6903_2_0777F690
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_07777E8C3_2_07777E8C
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_0777A4C13_2_0777A4C1
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_0777A4C83_2_0777A4C8
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_07776B483_2_07776B48
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_07776B383_2_07776B38
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_0777A2683_2_0777A268
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_0777A2583_2_0777A258
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_0777B2C83_2_0777B2C8
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_0777F9303_2_0777F930
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_0777A0303_2_0777A030
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_0777A0203_2_0777A020
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_0777E0E83_2_0777E0E8
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_077770A03_2_077770A0
Source: C:\Users\user\Desktop\attached PI.exeCode function: 10_2_0693004010_2_06930040
Source: C:\Users\user\Desktop\attached PI.exeCode function: 10_2_069202B010_2_069202B0
Source: C:\Users\user\Desktop\attached PI.exeCode function: 10_2_0732331010_2_07323310
Source: C:\Users\user\Desktop\attached PI.exeCode function: 10_2_0731332410_2_07313324
Source: C:\Users\user\Desktop\attached PI.exeCode function: 10_2_073142EB10_2_073142EB
Source: C:\Users\user\Desktop\attached PI.exeCode function: 10_2_073146D310_2_073146D3
Source: C:\Users\user\Desktop\attached PI.exeCode function: 10_2_02C8E48010_2_02C8E480
Source: C:\Users\user\Desktop\attached PI.exeCode function: 10_2_02C8E47110_2_02C8E471
Source: C:\Users\user\Desktop\attached PI.exeCode function: 10_2_02C8BBD410_2_02C8BBD4
Source: attached PI.exe, 00000003.00000002.342327645.00000000076D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameQuestKingdom.dllH vs attached PI.exe
Source: attached PI.exe, 00000003.00000002.342621622.0000000007900000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs attached PI.exe
Source: attached PI.exe, 00000003.00000002.331952602.000000000409E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQuestKingdom.dllH vs attached PI.exe
Source: attached PI.exe, 00000003.00000002.331952602.000000000409E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs attached PI.exe
Source: attached PI.exe, 00000003.00000002.331952602.000000000409E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUCDORZM.exe4 vs attached PI.exe
Source: attached PI.exe, 00000003.00000000.286451427.0000000000C5C000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameUCDORZM.exe4 vs attached PI.exe
Source: attached PI.exe, 00000003.00000002.328075400.0000000002F51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs attached PI.exe
Source: attached PI.exeBinary or memory string: OriginalFilename vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.584186936.0000000006480000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.574582318.0000000003E61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.574582318.0000000003E61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.574582318.0000000003E61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.588566873.00000000072A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.575150438.0000000003EE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.588888297.00000000072C8000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.588307356.0000000007270000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.587511631.00000000070C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.588382533.0000000007280000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.588135016.0000000007250000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.588486274.0000000007290000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.589475883.000000000731E000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.589212497.00000000072F8000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000003.347369078.00000000066EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.588238329.0000000007260000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.588938112.00000000072D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.588938112.00000000072D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs attached PI.exe
Source: attached PI.exe, 0000000A.00000002.586982488.0000000006920000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs attached PI.exe
Source: attached PI.exe, 0000000F.00000002.405688207.000000000414A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQuestKingdom.dllH vs attached PI.exe
Source: attached PI.exe, 00000015.00000002.442688511.0000000003421000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 00000015.00000002.442688511.0000000003421000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 00000015.00000002.445813095.0000000004429000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exe, 00000015.00000002.445813095.0000000004429000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs attached PI.exe
Source: attached PI.exe, 00000015.00000002.445813095.0000000004429000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs attached PI.exe
Source: attached PI.exeBinary or memory string: OriginalFilenameUCDORZM.exe4 vs attached PI.exe
Source: attached PI.exeReversingLabs: Detection: 28%
Source: C:\Users\user\Desktop\attached PI.exeFile read: C:\Users\user\Desktop\attached PI.exeJump to behavior
Source: attached PI.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\attached PI.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\attached PI.exe "C:\Users\user\Desktop\attached PI.exe"
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmpE760.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Users\user\Desktop\attached PI.exe {path}
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Users\user\Desktop\attached PI.exe {path}
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpD63A.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpD9B5.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\user\Desktop\attached PI.exe "C:\Users\user\Desktop\attached PI.exe" 0
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmp6181.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Users\user\Desktop\attached PI.exe {path}
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Users\user\Desktop\attached PI.exe {path}
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmp6CEB.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmp8C89.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmpE760.tmpJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Users\user\Desktop\attached PI.exe {path}Jump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Users\user\Desktop\attached PI.exe {path}Jump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpD63A.tmpJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpD9B5.tmpJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmp6181.tmpJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Users\user\Desktop\attached PI.exe {path}Jump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Users\user\Desktop\attached PI.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmp6CEB.tmpJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmp8C89.tmp
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Users\user\Desktop\attached PI.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\attached PI.exeFile created: C:\Users\user\AppData\Roaming\ecCUXmnB.exeJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE760.tmpJump to behavior
Source: classification engineClassification label: mal100.troj.evad.winEXE@34/16@14/1
Source: C:\Users\user\Desktop\attached PI.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: attached PI.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\attached PI.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Users\user\Desktop\attached PI.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5360:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5356:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5184:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6068:120:WilError_01
Source: C:\Users\user\Desktop\attached PI.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{fba1bbc6-2cc8-4c94-b6c0-dda5a12fd7fe}
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1236:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2904:120:WilError_01
Source: C:\Users\user\Desktop\attached PI.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
Source: 10.0.attached PI.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
Source: 10.0.attached PI.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
Source: 10.0.attached PI.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\attached PI.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: attached PI.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: attached PI.exeStatic file information: File size 1131520 > 1048576
Source: attached PI.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: attached PI.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x108600
Source: attached PI.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.588135016.0000000007250000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.588307356.0000000007270000.00000004.08000000.00040000.00000000.sdmp, attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.588486274.0000000007290000.00000004.08000000.00040000.00000000.sdmp, attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: attached PI.exe, 0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.588382533.0000000007280000.00000004.08000000.00040000.00000000.sdmp, attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.588238329.0000000007260000.00000004.08000000.00040000.00000000.sdmp

Data Obfuscation

barindex
Source: 10.0.attached PI.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 10.0.attached PI.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_04F76BB5 push FFFFFF8Bh; iretd 3_2_04F76BB7
Source: C:\Users\user\Desktop\attached PI.exeCode function: 3_2_07779618 pushad ; ret 3_2_07779619
Source: attached PI.exeStatic PE information: 0xA0F4C794 [Wed Jul 28 14:07:16 2055 UTC]
Source: initial sampleStatic PE information: section name: .text entropy: 6.975603145945541
Source: initial sampleStatic PE information: section name: .text entropy: 6.975603145945541
Source: initial sampleStatic PE information: section name: .text entropy: 6.975603145945541
Source: 10.0.attached PI.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: 10.0.attached PI.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: C:\Users\user\Desktop\attached PI.exeFile created: C:\Users\user\AppData\Roaming\ecCUXmnB.exeJump to dropped file
Source: C:\Users\user\Desktop\attached PI.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmpE760.tmp

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\attached PI.exeFile opened: C:\Users\user\Desktop\attached PI.exe:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\attached PI.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: Yara matchFile source: 00000003.00000002.328075400.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: attached PI.exe PID: 1604, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4596, type: MEMORYSTR
Source: attached PI.exe, 00000003.00000002.328075400.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000F.00000002.403498358.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000010.00000002.409484512.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000011.00000002.431572900.000000000281D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
Source: attached PI.exe, 00000003.00000002.328075400.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000F.00000002.403498358.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000010.00000002.409484512.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000011.00000002.431572900.000000000281D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
Source: C:\Users\user\Desktop\attached PI.exe TID: 3000Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\attached PI.exe TID: 1276Thread sleep time: -4611686018427385s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\attached PI.exe TID: 4440Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3856Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2692Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\Desktop\attached PI.exe TID: 4688Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1412Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2348Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\attached PI.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\attached PI.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\attached PI.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\attached PI.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\attached PI.exeWindow / User API: threadDelayed 9214Jump to behavior
Source: C:\Users\user\Desktop\attached PI.exeWindow / User API: foregroundWindowGot 497Jump to behavior
Source: C:\Users\user\Desktop\attached PI.exeWindow / User API: foregroundWindowGot 576Jump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\attached PI.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\attached PI.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\attached PI.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: dhcpmon.exe, 00000011.00000002.431572900.000000000281D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
Source: dhcpmon.exe, 00000011.00000002.431572900.000000000281D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
Source: dhcpmon.exe, 00000011.00000002.431572900.000000000281D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: dhcpmon.exe, 00000011.00000002.431572900.000000000281D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
Source: dhcpmon.exe, 00000011.00000002.431572900.000000000281D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
Source: dhcpmon.exe, 00000011.00000002.431572900.000000000281D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: dhcpmon.exe, 00000011.00000002.431572900.000000000281D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
Source: dhcpmon.exe, 00000011.00000002.431572900.000000000281D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
Source: dhcpmon.exe, 00000011.00000002.431572900.000000000281D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
Source: C:\Users\user\Desktop\attached PI.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\attached PI.exeMemory written: C:\Users\user\Desktop\attached PI.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeMemory written: C:\Users\user\Desktop\attached PI.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmpE760.tmpJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Users\user\Desktop\attached PI.exe {path}Jump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Users\user\Desktop\attached PI.exe {path}Jump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpD63A.tmpJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpD9B5.tmpJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmp6181.tmpJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Users\user\Desktop\attached PI.exe {path}Jump to behavior
Source: C:\Users\user\Desktop\attached PI.exeProcess created: C:\Users\user\Desktop\attached PI.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmp6CEB.tmpJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmp8C89.tmp
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: attached PI.exe, 0000000A.00000002.567448130.000000000306F000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.574458177.000000000348D000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.567226650.000000000304D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: attached PI.exe, 0000000A.00000002.584246452.00000000065CC000.00000004.00000010.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.590243749.0000000008DAB000.00000004.00000010.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.590166092.00000000088AB000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager
Source: attached PI.exe, 0000000A.00000002.574458177.000000000348D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager4
Source: attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managert
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Users\user\Desktop\attached PI.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Users\user\Desktop\attached PI.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Users\user\Desktop\attached PI.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Users\user\Desktop\attached PI.exe VolumeInformation
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Users\user\Desktop\attached PI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\attached PI.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\attached PI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

Stealing of Sensitive Information

barindex
Source: Yara matchFile source: 10.2.attached PI.exe.59a0000.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 21.2.attached PI.exe.447060c.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 21.2.attached PI.exe.447060c.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 21.2.attached PI.exe.446b7d6.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.attached PI.exe.4011550.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 21.2.attached PI.exe.4474c35.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.attached PI.exe.4011550.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.59a0000.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.0.attached PI.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.59a4629.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.3febfa5.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.40005d2.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.4005ffe.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.attached PI.exe.4180a00.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000018.00000002.449651846.00000000034A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000A.00000000.324119603.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000A.00000002.583841977.00000000059A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.330758176.0000000003F59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000015.00000002.442688511.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.331952602.000000000409E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000015.00000002.445813095.0000000004429000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: attached PI.exe PID: 1604, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: attached PI.exe PID: 4748, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: attached PI.exe PID: 2192, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4460, type: MEMORYSTR

Remote Access Functionality

barindex
Source: attached PI.exe, 00000003.00000002.331952602.000000000409E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 00000003.00000002.330758176.0000000003F59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exeString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: attached PI.exe, 0000000A.00000002.574582318.0000000003E61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: attached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: attached PI.exe, 0000000A.00000002.588566873.00000000072A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: attached PI.exe, 0000000A.00000002.589359423.0000000007310000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: attached PI.exe, 0000000A.00000002.588307356.0000000007270000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 0000000A.00000002.588307356.0000000007270000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: attached PI.exe, 0000000A.00000000.324119603.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 0000000A.00000002.587511631.00000000070C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 0000000A.00000002.588382533.0000000007280000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 0000000A.00000002.588135016.0000000007250000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 0000000A.00000002.588486274.0000000007290000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 0000000A.00000002.588486274.0000000007290000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: attached PI.exe, 0000000A.00000003.347369078.00000000066EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 0000000A.00000002.588238329.0000000007260000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 0000000A.00000002.588238329.0000000007260000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: attached PI.exe, 0000000A.00000002.588938112.00000000072D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 0000000A.00000002.586982488.0000000006920000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 0000000A.00000002.588818445.00000000072C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 00000015.00000002.442688511.0000000003421000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 00000015.00000002.442688511.0000000003421000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: attached PI.exe, 00000015.00000002.445813095.0000000004429000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: attached PI.exe, 00000015.00000002.445813095.0000000004429000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: dhcpmon.exe, 00000018.00000002.449651846.00000000034A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 00000018.00000002.449651846.00000000034A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Yara matchFile source: 10.2.attached PI.exe.59a0000.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 21.2.attached PI.exe.447060c.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 21.2.attached PI.exe.447060c.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 21.2.attached PI.exe.446b7d6.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.attached PI.exe.4011550.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 21.2.attached PI.exe.4474c35.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.attached PI.exe.4011550.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.59a0000.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.0.attached PI.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.59a4629.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.3febfa5.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.40005d2.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 10.2.attached PI.exe.4005ffe.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.attached PI.exe.4180a00.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000018.00000002.449651846.00000000034A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000A.00000000.324119603.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000A.00000002.583841977.00000000059A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.330758176.0000000003F59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000015.00000002.442688511.0000000003421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.331952602.000000000409E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000015.00000002.445813095.0000000004429000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: attached PI.exe PID: 1604, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: attached PI.exe PID: 4748, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: attached PI.exe PID: 2192, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4460, type: MEMORYSTR
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Windows Management Instrumentation
1
Scheduled Task/Job
112
Process Injection
2
Masquerading
11
Input Capture
211
Security Software Discovery
Remote Services11
Input Capture
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Scheduled Task/Job
Boot or Logon Initialization Scripts1
Scheduled Task/Job
1
Disable or Modify Tools
LSASS Memory2
Process Discovery
Remote Desktop Protocol11
Archive Collected Data
Exfiltration Over Bluetooth1
Non-Standard Port
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
Virtualization/Sandbox Evasion
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Remote Access Software
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer1
Non-Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets1
File and Directory Discovery
SSHKeyloggingData Transfer Size Limits21
Application Layer Protocol
Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
Hidden Files and Directories
Cached Domain Credentials12
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup Items3
Obfuscated Files or Information
DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job12
Software Packing
Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
Timestomp
/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 711673 Sample: attached PI.exe Startdate: 28/09/2022 Architecture: WINDOWS Score: 100 68 brightnano1.ddns.net 2->68 72 Snort IDS alert for network traffic 2->72 74 Multi AV Scanner detection for domain / URL 2->74 76 Malicious sample detected (through community Yara rule) 2->76 78 15 other signatures 2->78 9 attached PI.exe 6 2->9         started        13 attached PI.exe 4 2->13         started        15 dhcpmon.exe 5 2->15         started        17 dhcpmon.exe 2->17         started        signatures3 process4 file5 62 C:\Users\user\AppData\Roaming\ecCUXmnB.exe, PE32 9->62 dropped 64 C:\Users\user\AppData\Local\...\tmpE760.tmp, XML 9->64 dropped 66 C:\Users\user\AppData\...\attached PI.exe.log, ASCII 9->66 dropped 82 Injects a PE file into a foreign processes 9->82 19 attached PI.exe 1 15 9->19         started        24 schtasks.exe 1 9->24         started        26 attached PI.exe 9->26         started        28 schtasks.exe 13->28         started        38 2 other processes 13->38 30 schtasks.exe 15->30         started        32 dhcpmon.exe 15->32         started        34 schtasks.exe 17->34         started        36 dhcpmon.exe 17->36         started        signatures6 process7 dnsIp8 70 brightnano1.ddns.net 171.22.30.170, 1989, 49701, 49702 CMCSUS Germany 19->70 56 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->56 dropped 58 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 19->58 dropped 60 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 19->60 dropped 80 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->80 40 schtasks.exe 1 19->40         started        42 schtasks.exe 1 19->42         started        44 conhost.exe 24->44         started        46 conhost.exe 28->46         started        48 conhost.exe 30->48         started        50 conhost.exe 34->50         started        file9 signatures10 process11 process12 52 conhost.exe 40->52         started        54 conhost.exe 42->54         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
attached PI.exe28%ReversingLabsByteCode-MSIL.Backdoor.NanoBot
attached PI.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\ecCUXmnB.exe100%Joe Sandbox ML
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe28%ReversingLabsByteCode-MSIL.Backdoor.NanoBot
C:\Users\user\AppData\Roaming\ecCUXmnB.exe28%ReversingLabsByteCode-MSIL.Backdoor.NanoBot
SourceDetectionScannerLabelLinkDownload
10.2.attached PI.exe.59a0000.18.unpack100%AviraTR/NanoCore.fadteDownload File
10.0.attached PI.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
SourceDetectionScannerLabelLink
brightnano1.ddns.net14%VirustotalBrowse
SourceDetectionScannerLabelLink
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.tiro.com0%URL Reputationsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.urwpp.de0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe
http://www.fontbureau.comF0%URL Reputationsafe
http://www.fonts.comn-u0%URL Reputationsafe
http://www.urwpp.deF0%URL Reputationsafe
http://www.fontbureau.comd0%URL Reputationsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.founder.com.cn/cn/0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.fontbureau.comF2muP0%Avira URL Cloudsafe
0%Avira URL Cloudsafe
http://www.fontbureau.comals)m0%Avira URL Cloudsafe
http://www.sandoll.co.krendDo;P0%Avira URL Cloudsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.fontbureau.como0%URL Reputationsafe
http://www.fontbureau.comals0%URL Reputationsafe
http://en.wI0%Avira URL Cloudsafe
http://www.fontbureau.comaen0%Avira URL Cloudsafe
http://www.fontbureau.comnn0%Avira URL Cloudsafe
http://www.fontbureau.comFVm)P0%Avira URL Cloudsafe
http://www.tiro.comn7OgPF0%Avira URL Cloudsafe
http://www.fontbureau.comtoed0%Avira URL Cloudsafe
http://www.sandoll.co.krntaD/0%Avira URL Cloudsafe
http://www.fontbureau.comTTFd_m0%Avira URL Cloudsafe
http://www.fontbureau.comL.TTF;mzP0%Avira URL Cloudsafe
http://www.fonts.com(O0%Avira URL Cloudsafe
http://www.tiro.comSO0%Avira URL Cloudsafe
brightnano1.ddns.net100%Avira URL Cloudmalware
http://www.sajatypeworks.comn-uX00%Avira URL Cloudsafe
http://www.fonts.come0%Avira URL Cloudsafe
http://www.fontbureau.comsiefMm0%Avira URL Cloudsafe
http://www.founder.com.cn/cn/-0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
brightnano1.ddns.net
171.22.30.170
truetrueunknown
NameMaliciousAntivirus DetectionReputation
true
  • Avira URL Cloud: safe
low
brightnano1.ddns.nettrue
  • Avira URL Cloud: malware
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://www.fontbureau.comF2muPattached PI.exe, 00000003.00000003.297334590.0000000005F4A000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.297020606.0000000005F49000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.fontbureau.com/designersGattached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    http://www.fontbureau.com/designers/?attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.founder.com.cn/cn/bTheattached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://en.wIattached PI.exe, 00000003.00000003.289662678.000000000160D000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.sandoll.co.krendDo;Pattached PI.exe, 00000003.00000003.291895691.0000000005F49000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      low
      http://www.fontbureau.comals)mattached PI.exe, 00000003.00000003.297991182.0000000005F49000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      low
      http://www.fontbureau.com/designers?attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.fontbureau.comaenattached PI.exe, 00000003.00000003.325653593.0000000005F40000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.tiro.comattached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290734249.0000000005F5B000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.fontbureau.comnnattached PI.exe, 00000003.00000003.297020606.0000000005F49000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.fontbureau.com/designersattached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.fontbureau.comtoedattached PI.exe, 00000003.00000003.297020606.0000000005F49000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.goodfont.co.krattached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://google.comattached PI.exe, 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.588382533.0000000007280000.00000004.08000000.00040000.00000000.sdmp, attached PI.exe, 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.comFVm)Pattached PI.exe, 00000003.00000003.297991182.0000000005F49000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            low
            http://www.sajatypeworks.comattached PI.exe, 00000003.00000003.289958917.0000000005F5B000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.typography.netDattached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cn/cTheattached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.galapagosdesign.com/staff/dennis.htmattached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://fontfabrik.comattached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.tiro.comn7OgPFattached PI.exe, 00000003.00000003.290754999.0000000005F5B000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.sandoll.co.krntaD/attached PI.exe, 00000003.00000003.291895691.0000000005F49000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.comTTFd_mattached PI.exe, 00000003.00000003.297991182.0000000005F49000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            low
            http://www.fontbureau.comL.TTF;mzPattached PI.exe, 00000003.00000003.297334590.0000000005F4A000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.297020606.0000000005F49000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.297991182.0000000005F49000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            low
            http://www.fontbureau.com/attached PI.exe, 00000003.00000003.297020606.0000000005F49000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.296598172.0000000005F48000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.galapagosdesign.com/DPleaseattached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fonts.comattached PI.exe, 00000003.00000003.290249380.0000000005F64000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290309072.0000000005F64000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290425292.0000000005F5B000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290289127.0000000005F5B000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290232356.0000000005F5B000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290377873.0000000005F5B000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.sandoll.co.krattached PI.exe, 00000003.00000003.291895691.0000000005F49000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.urwpp.deDPleaseattached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.urwpp.deattached PI.exe, 00000003.00000003.297991182.0000000005F49000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.zhongyicts.com.cnattached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameattached PI.exe, 00000003.00000002.328075400.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 0000000F.00000002.403498358.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000010.00000002.409484512.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000011.00000002.431572900.000000000281D000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fonts.com(Oattached PI.exe, 00000003.00000003.290289127.0000000005F5B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.sakkal.comattached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.tiro.comSOattached PI.exe, 00000003.00000003.290754999.0000000005F5B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.apache.org/licenses/LICENSE-2.0attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.comattached PI.exe, 00000003.00000003.297991182.0000000005F49000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.comFattached PI.exe, 00000003.00000003.297020606.0000000005F49000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fonts.comeattached PI.exe, 00000003.00000003.290309072.0000000005F64000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fonts.comn-uattached PI.exe, 00000003.00000003.290249380.0000000005F64000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290309072.0000000005F64000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comn-uX0attached PI.exe, 00000003.00000003.290001259.0000000005F63000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290249380.0000000005F64000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290309072.0000000005F64000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290366189.0000000005F64000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290043716.0000000005F64000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290206189.0000000005F64000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.289958917.0000000005F5B000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290142745.0000000005F64000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.290177451.0000000005F64000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.urwpp.deFattached PI.exe, 00000003.00000003.296598172.0000000005F48000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comdattached PI.exe, 00000003.00000003.297020606.0000000005F49000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.297991182.0000000005F49000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlattached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn/attached PI.exe, 00000003.00000003.293345954.0000000005F44000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNattached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cnattached PI.exe, 00000003.00000003.292838602.0000000005F7D000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.293361358.0000000005F49000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.292992929.0000000005F44000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.293345954.0000000005F44000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-user.htmlattached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comsiefMmattached PI.exe, 00000003.00000003.297991182.0000000005F49000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.com/designers/cabarga.htmlattached PI.exe, 00000003.00000003.297434096.0000000005F7D000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.297581397.0000000005F7D000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.297534861.0000000005F7D000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.297508471.0000000005F7D000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.297455091.0000000005F7D000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comoattached PI.exe, 00000003.00000003.325653593.0000000005F40000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers8attached PI.exe, 00000003.00000002.338387946.0000000007152000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/deDn:Pgattached PI.exe, 00000003.00000003.297334590.0000000005F4A000.00000004.00000800.00020000.00000000.sdmp, attached PI.exe, 00000003.00000003.297020606.0000000005F49000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.comalsattached PI.exe, 00000003.00000003.297991182.0000000005F49000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cn/-attached PI.exe, 00000003.00000003.293345954.0000000005F44000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                171.22.30.170
                                brightnano1.ddns.netGermany
                                33657CMCSUStrue
                                Joe Sandbox Version:36.0.0 Rainbow Opal
                                Analysis ID:711673
                                Start date and time:2022-09-28 12:03:48 +02:00
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 9m 17s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Sample file name:attached PI.exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:31
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.evad.winEXE@34/16@14/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HDC Information:Failed
                                HCA Information:
                                • Successful, ratio: 93%
                                • Number of executed functions: 64
                                • Number of non-executed functions: 31
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                • Not all processes where analyzed, report is missing behavior information
                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                12:04:44API Interceptor828x Sleep call for process: attached PI.exe modified
                                12:04:55AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                12:04:56Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\attached PI.exe" s>$(Arg0)
                                12:04:58Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                                12:05:17API Interceptor2x Sleep call for process: dhcpmon.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                171.22.30.170Jens Frodesen CV.exeGet hashmaliciousBrowse
                                  Jens Frodesen CV.exeGet hashmaliciousBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    brightnano1.ddns.netJens Frodesen CV.exeGet hashmaliciousBrowse
                                    • 171.22.30.170
                                    Jens Frodesen CV.exeGet hashmaliciousBrowse
                                    • 171.22.30.170
                                    remittance.exeGet hashmaliciousBrowse
                                    • 171.22.30.97
                                    Re Remittance Advice.exeGet hashmaliciousBrowse
                                    • 171.22.30.97
                                    RFQ23449.exeGet hashmaliciousBrowse
                                    • 171.22.30.97
                                    SecuriteInfo.com.W32.AIDetectNet.01.22085.exeGet hashmaliciousBrowse
                                    • 107.182.129.128
                                    SecuriteInfo.com.IL.Trojan.MSILZilla.22069.19688.exeGet hashmaliciousBrowse
                                    • 107.182.129.128
                                    SecuriteInfo.com.W32.AIDetectNet.01.13156.exeGet hashmaliciousBrowse
                                    • 107.182.129.128
                                    gfcytttt.exeGet hashmaliciousBrowse
                                    • 107.182.129.128
                                    SecuriteInfo.com.W32.AIDetectNet.01.17432.exeGet hashmaliciousBrowse
                                    • 105.112.217.248
                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    CMCSUSfile.exeGet hashmaliciousBrowse
                                    • 171.22.30.106
                                    file.exeGet hashmaliciousBrowse
                                    • 171.22.30.106
                                    file.exeGet hashmaliciousBrowse
                                    • 171.22.30.106
                                    file.exeGet hashmaliciousBrowse
                                    • 171.22.30.106
                                    file.exeGet hashmaliciousBrowse
                                    • 171.22.30.106
                                    SecuriteInfo.com.Win32.PWSX-gen.3461.exeGet hashmaliciousBrowse
                                    • 81.161.229.75
                                    file.exeGet hashmaliciousBrowse
                                    • 171.22.30.106
                                    http://81.161.229.46/jawsGet hashmaliciousBrowse
                                    • 81.161.229.46
                                    file.exeGet hashmaliciousBrowse
                                    • 171.22.30.106
                                    file.exeGet hashmaliciousBrowse
                                    • 171.22.30.106
                                    file.exeGet hashmaliciousBrowse
                                    • 171.22.30.106
                                    file.exeGet hashmaliciousBrowse
                                    • 171.22.30.106
                                    file.exeGet hashmaliciousBrowse
                                    • 171.22.30.106
                                    file.exeGet hashmaliciousBrowse
                                    • 171.22.30.106
                                    file.exeGet hashmaliciousBrowse
                                    • 171.22.30.106
                                    file.exeGet hashmaliciousBrowse
                                    • 171.22.30.106
                                    file.exeGet hashmaliciousBrowse
                                    • 171.22.30.106
                                    file.exeGet hashmaliciousBrowse
                                    • 171.22.30.106
                                    file.exeGet hashmaliciousBrowse
                                    • 171.22.30.106
                                    file.exeGet hashmaliciousBrowse
                                    • 171.22.30.106
                                    No context
                                    No context
                                    Process:C:\Users\user\Desktop\attached PI.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):1131520
                                    Entropy (8bit):6.901099612044746
                                    Encrypted:false
                                    SSDEEP:12288:c3mY2iNw0+9MKvADqjJ5nr9fAn/CoE2g++sn3Qwon89AGPEAbVNqPKvmvuoZ2aVc:c3x1Ieyjrrm/C72g2QFnE7P5
                                    MD5:238B41E834F3B663584D4788493BC75F
                                    SHA1:006EFA65C3A4C5B4EE2402AB5E6D789FC95E0B9C
                                    SHA-256:E0B3C7281DD3488DF3C71EE35DDE8FE321E5AAE4D3F200D2F63DFEF64A97DAFF
                                    SHA-512:23A862D13B143D37328E8055D99329E0EC5CAAA0A554706EB18AD3E0AC298BB5E10141F9101019223BFE77F2ABCADFE90E27B91A453C5CF6CB8FE37396AF956D
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 28%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................P.................. ........@.. ....................................@.................................\...O.......8............................................................................ ............... ..H............text........ ...................... ..`.rsrc...8...........................@..@.reloc...............B..............@..B........................H..................V.......8............................................*..($...*&..(%....*.s&........s'........s(........s)........s*........*Z........o=...........*&..(>....*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*...{......,.+.....,.rq..ps@...z..
                                    Process:C:\Users\user\Desktop\attached PI.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):26
                                    Entropy (8bit):3.95006375643621
                                    Encrypted:false
                                    SSDEEP:3:ggPYV:rPYV
                                    MD5:187F488E27DB4AF347237FE461A079AD
                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                    Malicious:true
                                    Preview:[ZoneTransfer]....ZoneId=0
                                    Process:C:\Users\user\Desktop\attached PI.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1216
                                    Entropy (8bit):5.355304211458859
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                    MD5:69206D3AF7D6EFD08F4B4726998856D3
                                    SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                    SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                    SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                    Malicious:true
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                    Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1216
                                    Entropy (8bit):5.355304211458859
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                    MD5:69206D3AF7D6EFD08F4B4726998856D3
                                    SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                    SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                    SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                    Malicious:false
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                    Process:C:\Users\user\Desktop\attached PI.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1641
                                    Entropy (8bit):5.178198085945928
                                    Encrypted:false
                                    SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGFtn:cbhK79lNQR/rydbz9I3YODOLNdq30
                                    MD5:D44529740ECFF6AE70C76D0A3C410D4C
                                    SHA1:4F89B46804F9DD3C912F1339E67A47F17CC71889
                                    SHA-256:A53275C1E247E1D887956DBDE3C9CA1AAA72269BD65D9A2A2D4F31CF36D67491
                                    SHA-512:41B22B3AE8679A5ECCCD084D2194FB611F6D3FF040FED381DE0AF3FA1DAF339A7B44E94180F2AC7FB63F106CF199135B9C4EA0FFA848CEB5024CDEB988154660
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                    Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1641
                                    Entropy (8bit):5.178198085945928
                                    Encrypted:false
                                    SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGFtn:cbhK79lNQR/rydbz9I3YODOLNdq30
                                    MD5:D44529740ECFF6AE70C76D0A3C410D4C
                                    SHA1:4F89B46804F9DD3C912F1339E67A47F17CC71889
                                    SHA-256:A53275C1E247E1D887956DBDE3C9CA1AAA72269BD65D9A2A2D4F31CF36D67491
                                    SHA-512:41B22B3AE8679A5ECCCD084D2194FB611F6D3FF040FED381DE0AF3FA1DAF339A7B44E94180F2AC7FB63F106CF199135B9C4EA0FFA848CEB5024CDEB988154660
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                    Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1641
                                    Entropy (8bit):5.178198085945928
                                    Encrypted:false
                                    SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGFtn:cbhK79lNQR/rydbz9I3YODOLNdq30
                                    MD5:D44529740ECFF6AE70C76D0A3C410D4C
                                    SHA1:4F89B46804F9DD3C912F1339E67A47F17CC71889
                                    SHA-256:A53275C1E247E1D887956DBDE3C9CA1AAA72269BD65D9A2A2D4F31CF36D67491
                                    SHA-512:41B22B3AE8679A5ECCCD084D2194FB611F6D3FF040FED381DE0AF3FA1DAF339A7B44E94180F2AC7FB63F106CF199135B9C4EA0FFA848CEB5024CDEB988154660
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                    Process:C:\Users\user\Desktop\attached PI.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1301
                                    Entropy (8bit):5.091259752872306
                                    Encrypted:false
                                    SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Yc1xtn:cbk4oL600QydbQxIYODOLedq3I1j
                                    MD5:05CB9D147938E4D615808C78EC195503
                                    SHA1:CEC5B9AF5ADCE5DF733B630917C2FA999C806019
                                    SHA-256:7D3AB0C2A42695005C8E1B42350AE0DDB7376F3CA12F2E4DDA3701FE53AB8FD6
                                    SHA-512:D9349D1146E4E65C06BE6E60D66DE4E49A0AFD312EC468E6D4EFBFEB5AF92E265B4A445ECD31E81975546C5A6FEC91F0CD6B35548805B5068BB8409A10B98FC4
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                    Process:C:\Users\user\Desktop\attached PI.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1310
                                    Entropy (8bit):5.109425792877704
                                    Encrypted:false
                                    SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                    MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                    SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                    SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                    SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                    Process:C:\Users\user\Desktop\attached PI.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1641
                                    Entropy (8bit):5.178198085945928
                                    Encrypted:false
                                    SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGFtn:cbhK79lNQR/rydbz9I3YODOLNdq30
                                    MD5:D44529740ECFF6AE70C76D0A3C410D4C
                                    SHA1:4F89B46804F9DD3C912F1339E67A47F17CC71889
                                    SHA-256:A53275C1E247E1D887956DBDE3C9CA1AAA72269BD65D9A2A2D4F31CF36D67491
                                    SHA-512:41B22B3AE8679A5ECCCD084D2194FB611F6D3FF040FED381DE0AF3FA1DAF339A7B44E94180F2AC7FB63F106CF199135B9C4EA0FFA848CEB5024CDEB988154660
                                    Malicious:true
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                    Process:C:\Users\user\Desktop\attached PI.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):232
                                    Entropy (8bit):7.024371743172393
                                    Encrypted:false
                                    SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                                    MD5:32D0AAE13696FF7F8AF33B2D22451028
                                    SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                                    SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                                    SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                                    Malicious:false
                                    Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                                    Process:C:\Users\user\Desktop\attached PI.exe
                                    File Type:ISO-8859 text, with no line terminators
                                    Category:dropped
                                    Size (bytes):8
                                    Entropy (8bit):3.0
                                    Encrypted:false
                                    SSDEEP:3:Dq:e
                                    MD5:6A2D94F5982D067BF2A1AB36640A7E5E
                                    SHA1:6F5ABF73D95734947FF9C95EBC4F8F58665D8B31
                                    SHA-256:0D0B21D2A7CE3DB3F754897DBF994F8C0F04BD005D5F013143450F1DB032E41E
                                    SHA-512:7022B33CE54E134E018FF88F5B683751FBD0146E0AAB4B24E872FE998FB46A7FE6076ED09C240520EB93D64B5E78726A7E4D72156B3822090A677BBBFDE19C0C
                                    Malicious:true
                                    Preview:.S..8..H
                                    Process:C:\Users\user\Desktop\attached PI.exe
                                    File Type:data
                                    Category:modified
                                    Size (bytes):40
                                    Entropy (8bit):5.153055907333276
                                    Encrypted:false
                                    SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                    MD5:4E5E92E2369688041CC82EF9650EDED2
                                    SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                    SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                    SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                    Malicious:false
                                    Preview:9iH...}Z.4..f.~a........~.~.......3.U.
                                    Process:C:\Users\user\Desktop\attached PI.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):327432
                                    Entropy (8bit):7.99938831605763
                                    Encrypted:true
                                    SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                                    MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                                    SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                                    SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                                    SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                                    Malicious:false
                                    Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                                    Process:C:\Users\user\Desktop\attached PI.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):38
                                    Entropy (8bit):4.188331131693838
                                    Encrypted:false
                                    SSDEEP:3:oNt+WfWE05C:oNwvEEC
                                    MD5:AF41AEE5DDE3AEBD95B39C61F92F2814
                                    SHA1:B513EE3B2578182B7AA3A0AB5D71B4698A2B82F2
                                    SHA-256:C4E0DFFF3F4206C47C3D8893BADA97A68D5236D75ADE3947D5B09A2D8C0F2D00
                                    SHA-512:24D9C0BE8BD4B95E34B7FE87715D531925DEFFE2B87739BF8F6132B1C3C59070C35853F44A58974E67FFD84BBF40AB2B99BFDD29FEB54B102596F715F3335AFD
                                    Malicious:false
                                    Preview:C:\Users\user\Desktop\attached PI.exe
                                    Process:C:\Users\user\Desktop\attached PI.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):1131520
                                    Entropy (8bit):6.901099612044746
                                    Encrypted:false
                                    SSDEEP:12288:c3mY2iNw0+9MKvADqjJ5nr9fAn/CoE2g++sn3Qwon89AGPEAbVNqPKvmvuoZ2aVc:c3x1Ieyjrrm/C72g2QFnE7P5
                                    MD5:238B41E834F3B663584D4788493BC75F
                                    SHA1:006EFA65C3A4C5B4EE2402AB5E6D789FC95E0B9C
                                    SHA-256:E0B3C7281DD3488DF3C71EE35DDE8FE321E5AAE4D3F200D2F63DFEF64A97DAFF
                                    SHA-512:23A862D13B143D37328E8055D99329E0EC5CAAA0A554706EB18AD3E0AC298BB5E10141F9101019223BFE77F2ABCADFE90E27B91A453C5CF6CB8FE37396AF956D
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 28%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................P.................. ........@.. ....................................@.................................\...O.......8............................................................................ ............... ..H............text........ ...................... ..`.rsrc...8...........................@..@.reloc...............B..............@..B........................H..................V.......8............................................*..($...*&..(%....*.s&........s'........s(........s)........s*........*Z........o=...........*&..(>....*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*...{......,.+.....,.rq..ps@...z..
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):6.901099612044746
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    • DOS Executable Generic (2002/1) 0.01%
                                    File name:attached PI.exe
                                    File size:1131520
                                    MD5:238b41e834f3b663584d4788493bc75f
                                    SHA1:006efa65c3a4c5b4ee2402ab5e6d789fc95e0b9c
                                    SHA256:e0b3c7281dd3488df3c71ee35dde8fe321e5aae4d3f200d2f63dfef64a97daff
                                    SHA512:23a862d13b143d37328e8055d99329e0ec5caaa0a554706eb18ad3e0ac298bb5e10141f9101019223bfe77f2abcadfe90e27b91a453c5cf6cb8fe37396af956d
                                    SSDEEP:12288:c3mY2iNw0+9MKvADqjJ5nr9fAn/CoE2g++sn3Qwon89AGPEAbVNqPKvmvuoZ2aVc:c3x1Ieyjrrm/C72g2QFnE7P5
                                    TLSH:4B353B1432E676BDF07787B65FC4BCF99B96F936431A90B224A72349472AD02CDE1072
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................P.................. ........@.. ....................................@................................
                                    Icon Hash:009abababababa00
                                    Entrypoint:0x50a5ae
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0xA0F4C794 [Wed Jul 28 14:07:16 2055 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x10a55c0x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x10c0000xb838.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1180000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x1085b40x108600False0.6172909278959811data6.975603145945541IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0x10c0000xb8380xba00False0.09587113575268817data3.6981687259727196IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x1180000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountry
                                    RT_ICON0x10c2800x8b3PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                    RT_ICON0x10cb340x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0
                                    RT_ICON0x110d5c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
                                    RT_ICON0x1133040x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 0
                                    RT_ICON0x114d6c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                                    RT_ICON0x115e140x988Device independent bitmap graphic, 24 x 48 x 32, image size 0
                                    RT_ICON0x11679c0x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 0
                                    RT_ICON0x116e540x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
                                    RT_GROUP_ICON0x1172bc0x76data
                                    RT_VERSION0x1173340x314data
                                    RT_MANIFEST0x1176480x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                    192.168.2.4171.22.30.1704970119892816766 09/28/22-12:05:02.686443TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497011989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704970319892025019 09/28/22-12:05:22.049360TCP2025019ET TROJAN Possible NanoCore C2 60B497031989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704970819892816766 09/28/22-12:06:01.338770TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497081989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704971119892816766 09/28/22-12:06:22.172077TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497111989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704970719892025019 09/28/22-12:05:54.025166TCP2025019ET TROJAN Possible NanoCore C2 60B497071989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704971319892025019 09/28/22-12:06:32.627748TCP2025019ET TROJAN Possible NanoCore C2 60B497131989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704970619892816718 09/28/22-12:05:48.890995TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497061989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704970919892025019 09/28/22-12:06:06.469048TCP2025019ET TROJAN Possible NanoCore C2 60B497091989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704971019892816766 09/28/22-12:06:14.491368TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497101989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704970419892025019 09/28/22-12:05:33.183062TCP2025019ET TROJAN Possible NanoCore C2 60B497041989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704970419892816766 09/28/22-12:05:33.986316TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497041989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704971019892025019 09/28/22-12:06:13.098552TCP2025019ET TROJAN Possible NanoCore C2 60B497101989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704971319892816766 09/28/22-12:06:34.136588TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497131989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704971419892025019 09/28/22-12:06:40.121067TCP2025019ET TROJAN Possible NanoCore C2 60B497141989192.168.2.4171.22.30.170
                                    171.22.30.170192.168.2.41989497142841753 09/28/22-12:07:00.176130TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)198949714171.22.30.170192.168.2.4
                                    192.168.2.4171.22.30.1704970819892025019 09/28/22-12:06:00.252868TCP2025019ET TROJAN Possible NanoCore C2 60B497081989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704971119892025019 09/28/22-12:06:19.288235TCP2025019ET TROJAN Possible NanoCore C2 60B497111989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704970619892816766 09/28/22-12:05:48.890995TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497061989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704970119892025019 09/28/22-12:05:00.703490TCP2025019ET TROJAN Possible NanoCore C2 60B497011989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704970319892816766 09/28/22-12:05:23.115950TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497031989192.168.2.4171.22.30.170
                                    171.22.30.170192.168.2.41989497052810290 09/28/22-12:05:40.491149TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 1198949705171.22.30.170192.168.2.4
                                    192.168.2.4171.22.30.1704970519892025019 09/28/22-12:05:40.016972TCP2025019ET TROJAN Possible NanoCore C2 60B497051989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704971219892025019 09/28/22-12:06:26.713238TCP2025019ET TROJAN Possible NanoCore C2 60B497121989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704971219892816766 09/28/22-12:06:27.481705TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497121989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704970219892025019 09/28/22-12:05:11.687415TCP2025019ET TROJAN Possible NanoCore C2 60B497021989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704970219892816766 09/28/22-12:05:12.780673TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497021989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704970519892816766 09/28/22-12:05:41.772448TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497051989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704970619892025019 09/28/22-12:05:47.986712TCP2025019ET TROJAN Possible NanoCore C2 60B497061989192.168.2.4171.22.30.170
                                    192.168.2.4171.22.30.1704970919892816766 09/28/22-12:06:07.869293TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497091989192.168.2.4171.22.30.170
                                    TimestampSource PortDest PortSource IPDest IP
                                    Sep 28, 2022 12:05:00.422650099 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:00.450193882 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:00.450310946 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:00.703490019 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:00.785625935 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:00.810659885 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:00.859870911 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:00.888756037 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.052102089 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.407006025 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.487763882 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.487885952 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.557956934 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.557982922 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.558001995 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.558022022 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.558062077 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.558096886 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.585247993 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.585284948 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.585310936 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.585339069 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.585357904 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.585383892 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.585410118 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.585421085 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.585443020 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.585455894 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.585481882 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.585517883 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.612560987 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.612585068 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.612601995 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.612620115 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.612639904 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.612654924 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.612665892 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.612679005 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.612694979 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.612710953 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.612730980 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.612735987 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.612751007 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.612759113 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.612775087 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.612787008 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.612797976 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.612812996 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.612829924 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.612845898 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.612853050 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.612865925 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.612876892 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.613022089 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.640002966 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640031099 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640053034 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640075922 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640089989 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.640117884 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640127897 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.640150070 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640172005 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640192986 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640212059 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.640223980 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640233994 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.640254021 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640274048 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640295029 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640306950 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.640327930 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640335083 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.640356064 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640377045 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640398026 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640410900 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.640429974 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640439987 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.640460014 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640480995 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640497923 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.640511036 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640531063 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640551090 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640575886 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640593052 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.640594006 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.640635967 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640656948 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640681028 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640692949 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.640712976 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640722036 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.640741110 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640762091 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640783072 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640804052 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.640813112 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640824080 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.640842915 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.640878916 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.670789003 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.670814991 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.670830965 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.670849085 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.670870066 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.670897961 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.670924902 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.670950890 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.670968056 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.670981884 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.670994997 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671013117 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671027899 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.671042919 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671058893 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671068907 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.671083927 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671102047 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671117067 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671124935 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.671139956 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671148062 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.671164989 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671180964 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671194077 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671210051 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671225071 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671232939 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.671248913 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671257019 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.671272993 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671289921 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671305895 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671317101 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.671329975 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671339035 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.671355009 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671372890 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671380043 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.671396017 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671407938 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671421051 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671437025 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671448946 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671457052 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.671472073 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671479940 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.671494961 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671511889 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671519995 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.671535015 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671545029 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.671560049 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671576023 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671591043 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671602011 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.671614885 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671631098 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671641111 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.671653986 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671665907 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671680927 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671694994 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.671705008 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671719074 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.671729088 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671745062 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.671751976 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671767950 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671783924 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.671791077 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.671832085 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.698741913 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.698776007 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.698802948 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.698827982 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.698848009 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.698869944 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.698940039 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.698966980 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.698991060 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699028969 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699048996 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.699071884 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699081898 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.699105978 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699129105 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699155092 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699161053 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.699182987 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699207067 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699225903 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.699242115 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699250937 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.699275017 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699301004 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699326992 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699348927 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.699362993 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699382067 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.699397087 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699420929 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699445963 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699455976 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.699491024 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.699500084 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699523926 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699546099 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699557066 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.699579954 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699603081 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699625969 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699640989 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.699659109 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699667931 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.699690104 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699714899 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699723959 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.699758053 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699781895 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699793100 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.699815035 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699836016 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699848890 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.699875116 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699898958 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699920893 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699934959 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.699951887 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.699963093 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.699985027 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.700010061 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.700021982 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.700042963 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.700067043 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.700078964 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.772452116 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.799846888 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.799887896 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.799921989 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.799932957 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.799967051 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.799978971 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.800009966 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800038099 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800059080 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.800080061 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800107956 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800134897 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.800147057 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800174952 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800188065 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.800213099 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800239086 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800265074 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800283909 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.800304890 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.800318003 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800344944 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800373077 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800385952 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.800412893 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800438881 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800453901 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.800477028 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800503016 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800514936 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.800540924 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800566912 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800578117 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.800604105 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800631046 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800662041 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.800690889 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800717115 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800728083 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.800755024 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800781012 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800791979 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.800818920 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800846100 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800858974 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.800884008 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800909996 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800926924 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.800951004 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800976992 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.800990105 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.801016092 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.801043987 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.801054001 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.801079988 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.801105976 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.801116943 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.801142931 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.801168919 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.801179886 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.801206112 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.801233053 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.801248074 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.801282883 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.801311016 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.801321983 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.801348925 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.801376104 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.801402092 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.801412106 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.801443100 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.801450014 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.801476002 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.801501989 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.801531076 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.801544905 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.801578999 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.945482969 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.975888968 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.975966930 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976025105 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976066113 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.976104975 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976147890 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976197958 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976208925 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.976252079 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976299047 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976309061 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.976342916 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.976372004 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976412058 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976458073 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976469040 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.976509094 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976557970 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976569891 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.976610899 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976651907 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976694107 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.976713896 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976756096 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976803064 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976814985 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.976847887 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.976875067 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976916075 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976963043 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.976975918 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.977016926 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.977067947 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.977078915 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.977125883 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.977190018 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.977232933 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.977267981 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.977308989 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.977327108 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.977368116 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.977407932 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.977422953 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.977464914 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.977505922 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.977524042 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.977566004 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.977606058 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.977647066 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.977664948 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.977708101 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.977750063 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.977767944 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.977807999 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.977828979 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.977870941 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.977929115 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.977965117 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.978017092 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.978061914 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.978108883 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.978132010 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.978173971 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.978213072 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.978255033 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.978296041 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.978313923 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.978355885 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.978396893 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.978435993 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.978451967 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.978492975 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.978534937 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:01.978553057 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.978589058 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:01.978615046 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.005662918 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.005713940 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.005758047 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.005790949 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.005835056 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.005858898 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:02.005899906 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:02.005928993 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.005973101 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.006015062 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.006058931 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.006076097 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:02.006118059 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.006160021 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.006176949 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:02.006218910 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.006259918 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.006275892 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:02.006311893 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:02.006335020 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.006380081 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.006422043 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.006439924 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:02.006480932 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.006521940 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.006541967 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:02.006583929 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.006627083 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.006668091 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.006685019 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:02.006726980 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.006773949 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.006784916 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:02.006823063 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:02.006844044 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:02.190759897 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:02.686443090 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:02.767419100 CEST198949701171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:03.817608118 CEST497011989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:11.658633947 CEST497021989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:11.686351061 CEST198949702171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:11.686856031 CEST497021989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:11.687414885 CEST497021989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:11.763215065 CEST198949702171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:11.770299911 CEST497021989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:11.828969002 CEST198949702171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:11.829263926 CEST497021989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:11.856971025 CEST198949702171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:11.947715998 CEST497021989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:12.024128914 CEST198949702171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:12.178272009 CEST198949702171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:12.394761086 CEST497021989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:12.422136068 CEST198949702171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:12.499509096 CEST497021989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:12.780673027 CEST497021989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:12.855391026 CEST198949702171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:12.855572939 CEST497021989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:12.883801937 CEST198949702171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:12.883913994 CEST497021989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:12.913496017 CEST198949702171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:12.994096994 CEST497021989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:13.115703106 CEST497021989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:13.199902058 CEST198949702171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:13.610745907 CEST497021989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:13.686471939 CEST198949702171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:15.342459917 CEST497021989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:22.020406008 CEST497031989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:22.048201084 CEST198949703171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:22.048795938 CEST497031989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:22.049360037 CEST497031989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:22.132817984 CEST198949703171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:22.133032084 CEST497031989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:22.191492081 CEST198949703171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:22.210402012 CEST497031989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:22.239198923 CEST198949703171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:22.458070040 CEST497031989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:22.546334982 CEST497031989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:22.635618925 CEST198949703171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:22.759862900 CEST198949703171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:22.770159006 CEST497031989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:22.798058033 CEST198949703171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:22.807313919 CEST497031989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:22.835525990 CEST198949703171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:22.835659027 CEST497031989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:22.863987923 CEST198949703171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:22.864202976 CEST497031989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:22.950572014 CEST198949703171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:23.115950108 CEST497031989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:23.196068048 CEST198949703171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:25.166414022 CEST497031989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:32.557706118 CEST497041989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:32.586189985 CEST198949704171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:32.586325884 CEST497041989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:33.183062077 CEST497041989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:33.255579948 CEST198949704171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:33.313879013 CEST198949704171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:33.399811029 CEST497041989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:33.738614082 CEST497041989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:33.767937899 CEST198949704171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:33.896518946 CEST497041989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:33.986315966 CEST497041989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:34.070579052 CEST198949704171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:34.266359091 CEST497041989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:34.347817898 CEST198949704171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:34.515243053 CEST198949704171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:34.584177971 CEST497041989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:34.611706018 CEST198949704171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:34.693507910 CEST497041989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:35.244904995 CEST497041989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:35.246558905 CEST497041989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:39.984469891 CEST497051989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:40.015746117 CEST198949705171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:40.016051054 CEST497051989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:40.016972065 CEST497051989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:40.101573944 CEST198949705171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:40.129457951 CEST198949705171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:40.129801035 CEST497051989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:40.158216000 CEST198949705171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:40.223449945 CEST497051989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:40.308712006 CEST198949705171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:40.491148949 CEST198949705171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:40.492151022 CEST497051989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:40.522648096 CEST198949705171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:40.529968977 CEST497051989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:40.608679056 CEST198949705171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:40.610169888 CEST497051989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:40.640733957 CEST198949705171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:40.756496906 CEST497051989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:40.787722111 CEST198949705171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:40.959631920 CEST497051989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:41.266936064 CEST198949705171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:41.459697008 CEST497051989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:41.772448063 CEST497051989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:41.848651886 CEST198949705171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:42.843790054 CEST497051989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:47.958400965 CEST497061989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:47.985960007 CEST198949706171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:47.986100912 CEST497061989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:47.986711979 CEST497061989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:48.062510014 CEST198949706171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:48.148118973 CEST198949706171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:48.148407936 CEST497061989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:48.178579092 CEST198949706171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:48.218764067 CEST497061989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:48.303056955 CEST198949706171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:48.504416943 CEST198949706171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:48.505295992 CEST497061989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:48.551580906 CEST198949706171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:48.552611113 CEST497061989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:48.584453106 CEST198949706171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:48.584558010 CEST497061989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:48.619802952 CEST198949706171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:48.619910002 CEST497061989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:48.701205969 CEST198949706171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:48.890995026 CEST497061989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:48.964715958 CEST198949706171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:49.279232025 CEST198949706171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:49.460386992 CEST497061989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:49.882628918 CEST497061989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:53.995479107 CEST497071989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:54.023989916 CEST198949707171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:54.024142981 CEST497071989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:54.025166035 CEST497071989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:54.103797913 CEST198949707171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:54.129184961 CEST198949707171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:54.178193092 CEST497071989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:54.208271980 CEST198949707171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:54.398334980 CEST497071989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:54.459604979 CEST497071989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:54.537691116 CEST198949707171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:54.682132006 CEST198949707171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:54.734462976 CEST497071989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:54.762012959 CEST198949707171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:54.804584026 CEST497071989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:54.912609100 CEST497071989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:54.941549063 CEST198949707171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:54.977458954 CEST497071989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:55.005573034 CEST198949707171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:05:55.054594994 CEST497071989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:05:56.159575939 CEST497071989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:00.221591949 CEST497081989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:00.252104044 CEST198949708171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:00.252269030 CEST497081989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:00.252867937 CEST497081989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:00.334992886 CEST198949708171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:00.335141897 CEST497081989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:00.403188944 CEST198949708171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:00.403553963 CEST497081989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:00.434598923 CEST198949708171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:00.466058969 CEST497081989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:00.551908016 CEST198949708171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:00.727685928 CEST198949708171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:00.730690956 CEST497081989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:00.759922028 CEST198949708171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:00.762269974 CEST497081989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:00.790169954 CEST198949708171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:00.794385910 CEST497081989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:00.837001085 CEST198949708171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:00.837121010 CEST497081989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:00.916527987 CEST198949708171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:01.338769913 CEST497081989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:01.412209988 CEST198949708171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:02.372136116 CEST497081989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:06.439779043 CEST497091989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:06.467987061 CEST198949709171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:06.468158960 CEST497091989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:06.469048023 CEST497091989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:06.548986912 CEST198949709171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:06.823040962 CEST198949709171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:06.823338032 CEST497091989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:06.855736017 CEST198949709171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:06.926954031 CEST497091989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:07.016100883 CEST198949709171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:07.016222954 CEST497091989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:07.099895000 CEST198949709171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:07.413983107 CEST198949709171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:07.417355061 CEST497091989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:07.446599007 CEST198949709171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:07.493196011 CEST497091989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:07.521272898 CEST198949709171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:07.527957916 CEST497091989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:07.556205034 CEST198949709171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:07.556399107 CEST497091989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:07.584728956 CEST198949709171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:07.633825064 CEST497091989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:07.773926020 CEST497091989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:07.860232115 CEST198949709171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:07.869292974 CEST497091989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:07.943958044 CEST198949709171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:08.994373083 CEST497091989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:13.069665909 CEST497101989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:13.097227097 CEST198949710171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:13.097479105 CEST497101989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:13.098551989 CEST497101989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:13.173721075 CEST198949710171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:13.238823891 CEST198949710171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:13.239454031 CEST497101989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:13.270587921 CEST198949710171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:13.321782112 CEST497101989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:13.642946959 CEST497101989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:13.719568968 CEST198949710171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:13.863873959 CEST198949710171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:13.867996931 CEST497101989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:13.895111084 CEST198949710171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:13.946835041 CEST497101989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:13.997220039 CEST497101989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:14.025582075 CEST198949710171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:14.025751114 CEST497101989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:14.067955017 CEST198949710171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:14.118690968 CEST497101989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:14.491368055 CEST497101989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:14.571962118 CEST198949710171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:14.852787018 CEST497101989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:14.925443888 CEST198949710171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:15.181720972 CEST497101989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:19.259716988 CEST497111989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:19.287353992 CEST198949711171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:19.287506104 CEST497111989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:19.288234949 CEST497111989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:19.367449999 CEST198949711171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:19.396907091 CEST198949711171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:19.399631977 CEST497111989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:19.428141117 CEST198949711171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:19.452656984 CEST497111989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:19.521806955 CEST198949711171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:19.676116943 CEST198949711171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:19.677038908 CEST497111989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:19.704502106 CEST198949711171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:19.744280100 CEST497111989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:19.824637890 CEST497111989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:19.852823973 CEST198949711171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:19.852951050 CEST497111989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:19.881594896 CEST198949711171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:19.901647091 CEST497111989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:19.981683016 CEST198949711171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:21.101274014 CEST497111989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:21.178498983 CEST198949711171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:21.342237949 CEST198949711171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:21.384944916 CEST497111989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:22.172076941 CEST497111989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:22.243742943 CEST198949711171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:22.611454010 CEST497111989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:26.683015108 CEST497121989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:26.711920023 CEST198949712171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:26.712177992 CEST497121989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:26.713238001 CEST497121989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:26.802014112 CEST198949712171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:26.895097971 CEST198949712171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:26.895513058 CEST497121989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:26.924053907 CEST198949712171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:26.963532925 CEST497121989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:27.122025013 CEST497121989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:27.198498011 CEST198949712171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:27.330833912 CEST198949712171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:27.349459887 CEST497121989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:27.378106117 CEST198949712171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:27.433665037 CEST497121989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:27.481704950 CEST497121989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:27.563097000 CEST198949712171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:27.563235998 CEST497121989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:27.592762947 CEST198949712171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:27.635574102 CEST497121989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:27.667090893 CEST198949712171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:27.713843107 CEST497121989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:28.534110069 CEST497121989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:32.599034071 CEST497131989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:32.626524925 CEST198949713171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:32.626785040 CEST497131989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:32.627748013 CEST497131989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:32.705476999 CEST198949713171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:32.774496078 CEST198949713171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:32.776688099 CEST497131989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:32.804440022 CEST198949713171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:32.833110094 CEST497131989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:32.902471066 CEST198949713171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:33.036305904 CEST198949713171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:33.038582087 CEST497131989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:33.066219091 CEST198949713171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:33.068116903 CEST497131989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:33.101435900 CEST198949713171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:33.101573944 CEST497131989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:33.129332066 CEST198949713171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:33.131619930 CEST497131989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:33.208717108 CEST198949713171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:34.136588097 CEST497131989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:34.219631910 CEST198949713171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:35.137253046 CEST497131989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:40.090480089 CEST497141989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:40.120069981 CEST198949714171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:40.120282888 CEST497141989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:40.121067047 CEST497141989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:40.197848082 CEST198949714171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:40.295041084 CEST198949714171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:40.346744061 CEST497141989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:40.358251095 CEST497141989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:40.387049913 CEST198949714171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:40.396348953 CEST497141989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:40.479651928 CEST198949714171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:40.647829056 CEST198949714171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:40.648241997 CEST497141989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:40.675586939 CEST198949714171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:40.677570105 CEST497141989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:40.708093882 CEST198949714171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:40.708760977 CEST497141989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:40.736948967 CEST198949714171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:40.941715956 CEST497141989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:45.155046940 CEST198949714171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:45.239866972 CEST497141989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:45.413033962 CEST198949714171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:45.540663004 CEST497141989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:50.160202980 CEST198949714171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:50.209410906 CEST497141989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:53.427339077 CEST198949714171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:53.475266933 CEST497141989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:06:55.161259890 CEST198949714171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:06:55.209717989 CEST497141989192.168.2.4171.22.30.170
                                    Sep 28, 2022 12:07:00.176130056 CEST198949714171.22.30.170192.168.2.4
                                    Sep 28, 2022 12:07:00.225723982 CEST497141989192.168.2.4171.22.30.170
                                    TimestampSource PortDest PortSource IPDest IP
                                    Sep 28, 2022 12:05:00.383311987 CEST5968353192.168.2.48.8.8.8
                                    Sep 28, 2022 12:05:00.403003931 CEST53596838.8.8.8192.168.2.4
                                    Sep 28, 2022 12:05:11.635108948 CEST6416753192.168.2.48.8.8.8
                                    Sep 28, 2022 12:05:11.654015064 CEST53641678.8.8.8192.168.2.4
                                    Sep 28, 2022 12:05:21.996689081 CEST5856553192.168.2.48.8.8.8
                                    Sep 28, 2022 12:05:22.016352892 CEST53585658.8.8.8192.168.2.4
                                    Sep 28, 2022 12:05:32.530100107 CEST5223953192.168.2.48.8.8.8
                                    Sep 28, 2022 12:05:32.551434040 CEST53522398.8.8.8192.168.2.4
                                    Sep 28, 2022 12:05:39.939918041 CEST5680753192.168.2.48.8.8.8
                                    Sep 28, 2022 12:05:39.963004112 CEST53568078.8.8.8192.168.2.4
                                    Sep 28, 2022 12:05:47.937693119 CEST6100753192.168.2.48.8.8.8
                                    Sep 28, 2022 12:05:47.957211018 CEST53610078.8.8.8192.168.2.4
                                    Sep 28, 2022 12:05:53.971554041 CEST6068653192.168.2.48.8.8.8
                                    Sep 28, 2022 12:05:53.992727041 CEST53606868.8.8.8192.168.2.4
                                    Sep 28, 2022 12:06:00.200548887 CEST6112453192.168.2.48.8.8.8
                                    Sep 28, 2022 12:06:00.220154047 CEST53611248.8.8.8192.168.2.4
                                    Sep 28, 2022 12:06:06.417634010 CEST5944453192.168.2.48.8.8.8
                                    Sep 28, 2022 12:06:06.437268972 CEST53594448.8.8.8192.168.2.4
                                    Sep 28, 2022 12:06:13.048048019 CEST5557053192.168.2.48.8.8.8
                                    Sep 28, 2022 12:06:13.068151951 CEST53555708.8.8.8192.168.2.4
                                    Sep 28, 2022 12:06:19.236522913 CEST6490653192.168.2.48.8.8.8
                                    Sep 28, 2022 12:06:19.258580923 CEST53649068.8.8.8192.168.2.4
                                    Sep 28, 2022 12:06:26.661247015 CEST5944653192.168.2.48.8.8.8
                                    Sep 28, 2022 12:06:26.681572914 CEST53594468.8.8.8192.168.2.4
                                    Sep 28, 2022 12:06:32.576051950 CEST5086153192.168.2.48.8.8.8
                                    Sep 28, 2022 12:06:32.596954107 CEST53508618.8.8.8192.168.2.4
                                    Sep 28, 2022 12:06:40.038276911 CEST6108853192.168.2.48.8.8.8
                                    Sep 28, 2022 12:06:40.061974049 CEST53610888.8.8.8192.168.2.4
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Sep 28, 2022 12:05:00.383311987 CEST192.168.2.48.8.8.80xe537Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:05:11.635108948 CEST192.168.2.48.8.8.80x7818Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:05:21.996689081 CEST192.168.2.48.8.8.80x659eStandard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:05:32.530100107 CEST192.168.2.48.8.8.80xa26cStandard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:05:39.939918041 CEST192.168.2.48.8.8.80x27ffStandard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:05:47.937693119 CEST192.168.2.48.8.8.80x9118Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:05:53.971554041 CEST192.168.2.48.8.8.80x1d50Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:06:00.200548887 CEST192.168.2.48.8.8.80x821eStandard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:06:06.417634010 CEST192.168.2.48.8.8.80xd8e2Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:06:13.048048019 CEST192.168.2.48.8.8.80x2205Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:06:19.236522913 CEST192.168.2.48.8.8.80x609eStandard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:06:26.661247015 CEST192.168.2.48.8.8.80x6b99Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:06:32.576051950 CEST192.168.2.48.8.8.80x5187Standard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:06:40.038276911 CEST192.168.2.48.8.8.80x707bStandard query (0)brightnano1.ddns.netA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Sep 28, 2022 12:05:00.403003931 CEST8.8.8.8192.168.2.40xe537No error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:05:11.654015064 CEST8.8.8.8192.168.2.40x7818No error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:05:22.016352892 CEST8.8.8.8192.168.2.40x659eNo error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:05:32.551434040 CEST8.8.8.8192.168.2.40xa26cNo error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:05:39.963004112 CEST8.8.8.8192.168.2.40x27ffNo error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:05:47.957211018 CEST8.8.8.8192.168.2.40x9118No error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:05:53.992727041 CEST8.8.8.8192.168.2.40x1d50No error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:06:00.220154047 CEST8.8.8.8192.168.2.40x821eNo error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:06:06.437268972 CEST8.8.8.8192.168.2.40xd8e2No error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:06:13.068151951 CEST8.8.8.8192.168.2.40x2205No error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:06:19.258580923 CEST8.8.8.8192.168.2.40x609eNo error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:06:26.681572914 CEST8.8.8.8192.168.2.40x6b99No error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:06:32.596954107 CEST8.8.8.8192.168.2.40x5187No error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false
                                    Sep 28, 2022 12:06:40.061974049 CEST8.8.8.8192.168.2.40x707bNo error (0)brightnano1.ddns.net171.22.30.170A (IP address)IN (0x0001)false

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:3
                                    Start time:12:04:33
                                    Start date:28/09/2022
                                    Path:C:\Users\user\Desktop\attached PI.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\attached PI.exe"
                                    Imagebase:0xb50000
                                    File size:1131520 bytes
                                    MD5 hash:238B41E834F3B663584D4788493BC75F
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.330758176.0000000003F59000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.330758176.0000000003F59000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.330758176.0000000003F59000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.330758176.0000000003F59000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.331952602.000000000409E000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.331952602.000000000409E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.331952602.000000000409E000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.331952602.000000000409E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000003.00000002.328075400.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low

                                    Target ID:7
                                    Start time:12:04:48
                                    Start date:28/09/2022
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmpE760.tmp
                                    Imagebase:0xce0000
                                    File size:185856 bytes
                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:8
                                    Start time:12:04:49
                                    Start date:28/09/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7c72c0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:9
                                    Start time:12:04:50
                                    Start date:28/09/2022
                                    Path:C:\Users\user\Desktop\attached PI.exe
                                    Wow64 process (32bit):false
                                    Commandline:{path}
                                    Imagebase:0x3d0000
                                    File size:1131520 bytes
                                    MD5 hash:238B41E834F3B663584D4788493BC75F
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low

                                    Target ID:10
                                    Start time:12:04:51
                                    Start date:28/09/2022
                                    Path:C:\Users\user\Desktop\attached PI.exe
                                    Wow64 process (32bit):true
                                    Commandline:{path}
                                    Imagebase:0xa40000
                                    File size:1131520 bytes
                                    MD5 hash:238B41E834F3B663584D4788493BC75F
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.587910914.00000000070F0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.574582318.0000000003E61000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.588566873.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.588566873.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.588566873.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.588566873.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.575917734.0000000003FE2000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.589359423.0000000007310000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.589359423.0000000007310000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.589359423.0000000007310000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.589359423.0000000007310000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.588307356.0000000007270000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.588307356.0000000007270000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.588307356.0000000007270000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.588307356.0000000007270000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000000.324119603.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000000.324119603.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 0000000A.00000000.324119603.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000000.324119603.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.587511631.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.587511631.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.587511631.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.587511631.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.588382533.0000000007280000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.588382533.0000000007280000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.588382533.0000000007280000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.588382533.0000000007280000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.588486274.0000000007290000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.588486274.0000000007290000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.588486274.0000000007290000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.588486274.0000000007290000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: NanoCore, Description: unknown, Source: 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.578123416.000000000414E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.583841977.00000000059A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.583841977.00000000059A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.583841977.00000000059A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.583841977.00000000059A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.583841977.00000000059A0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.588135016.0000000007250000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.588135016.0000000007250000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.588135016.0000000007250000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.588135016.0000000007250000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: NanoCore, Description: unknown, Source: 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.563358454.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000003.347369078.00000000066EA000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.583276687.0000000005530000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.583276687.0000000005530000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.583276687.0000000005530000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.583276687.0000000005530000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.588238329.0000000007260000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.588238329.0000000007260000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.588238329.0000000007260000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.588238329.0000000007260000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.588938112.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.588938112.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.588938112.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.588938112.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.586982488.0000000006920000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.586982488.0000000006920000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.586982488.0000000006920000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.586982488.0000000006920000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.588818445.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.588818445.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000A.00000002.588818445.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.588818445.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: NanoCore, Description: unknown, Source: 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.577106409.00000000040AA000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    Reputation:low

                                    Target ID:11
                                    Start time:12:04:55
                                    Start date:28/09/2022
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpD63A.tmp
                                    Imagebase:0xce0000
                                    File size:185856 bytes
                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:12
                                    Start time:12:04:55
                                    Start date:28/09/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7c72c0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:13
                                    Start time:12:04:55
                                    Start date:28/09/2022
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpD9B5.tmp
                                    Imagebase:0xce0000
                                    File size:185856 bytes
                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:14
                                    Start time:12:04:56
                                    Start date:28/09/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7c72c0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:15
                                    Start time:12:04:56
                                    Start date:28/09/2022
                                    Path:C:\Users\user\Desktop\attached PI.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\attached PI.exe" 0
                                    Imagebase:0xa70000
                                    File size:1131520 bytes
                                    MD5 hash:238B41E834F3B663584D4788493BC75F
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:low

                                    Target ID:16
                                    Start time:12:04:58
                                    Start date:28/09/2022
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                                    Imagebase:0x8b0000
                                    File size:1131520 bytes
                                    MD5 hash:238B41E834F3B663584D4788493BC75F
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Antivirus matches:
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 28%, ReversingLabs
                                    Reputation:low

                                    Target ID:17
                                    Start time:12:05:03
                                    Start date:28/09/2022
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                    Imagebase:0xc0000
                                    File size:1131520 bytes
                                    MD5 hash:238B41E834F3B663584D4788493BC75F
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:low

                                    Target ID:18
                                    Start time:12:05:19
                                    Start date:28/09/2022
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmp6181.tmp
                                    Imagebase:0xce0000
                                    File size:185856 bytes
                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:19
                                    Start time:12:05:20
                                    Start date:28/09/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff61e220000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:20
                                    Start time:12:05:21
                                    Start date:28/09/2022
                                    Path:C:\Users\user\Desktop\attached PI.exe
                                    Wow64 process (32bit):false
                                    Commandline:{path}
                                    Imagebase:0x340000
                                    File size:1131520 bytes
                                    MD5 hash:238B41E834F3B663584D4788493BC75F
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low

                                    Target ID:21
                                    Start time:12:05:22
                                    Start date:28/09/2022
                                    Path:C:\Users\user\Desktop\attached PI.exe
                                    Wow64 process (32bit):true
                                    Commandline:{path}
                                    Imagebase:0xe70000
                                    File size:1131520 bytes
                                    MD5 hash:238B41E834F3B663584D4788493BC75F
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.442688511.0000000003421000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.442688511.0000000003421000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000015.00000002.442688511.0000000003421000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.445813095.0000000004429000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.445813095.0000000004429000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000015.00000002.445813095.0000000004429000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                                    Target ID:22
                                    Start time:12:05:22
                                    Start date:28/09/2022
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmp6CEB.tmp
                                    Imagebase:0xce0000
                                    File size:185856 bytes
                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:23
                                    Start time:12:05:22
                                    Start date:28/09/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7c72c0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:24
                                    Start time:12:05:25
                                    Start date:28/09/2022
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:{path}
                                    Imagebase:0xcb0000
                                    File size:1131520 bytes
                                    MD5 hash:238B41E834F3B663584D4788493BC75F
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000002.449651846.00000000034A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000018.00000002.449651846.00000000034A1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000018.00000002.449651846.00000000034A1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                                    Target ID:25
                                    Start time:12:05:30
                                    Start date:28/09/2022
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ecCUXmnB" /XML "C:\Users\user\AppData\Local\Temp\tmp8C89.tmp
                                    Imagebase:0xce0000
                                    File size:185856 bytes
                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language

                                    Target ID:26
                                    Start time:12:05:31
                                    Start date:28/09/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7c72c0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language

                                    Target ID:27
                                    Start time:12:05:33
                                    Start date:28/09/2022
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:{path}
                                    Imagebase:0xbf0000
                                    File size:1131520 bytes
                                    MD5 hash:238B41E834F3B663584D4788493BC75F
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:.Net C# or VB.NET

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:11.6%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:143
                                      Total number of Limit Nodes:9
                                      execution_graph 24756 4f72e76 24760 4f74410 24756->24760 24765 4f74418 24756->24765 24757 4f72e90 24761 4f74417 WriteProcessMemory 24760->24761 24762 4f743a8 24760->24762 24764 4f744b4 24761->24764 24762->24757 24764->24757 24766 4f74463 WriteProcessMemory 24765->24766 24768 4f744b4 24766->24768 24768->24757 24777 4f72a52 24779 4f74410 WriteProcessMemory 24777->24779 24780 4f74418 WriteProcessMemory 24777->24780 24778 4f72a6a 24779->24778 24780->24778 24781 4f74251 24782 4f74257 VirtualAllocEx 24781->24782 24783 4f741e8 ReadProcessMemory 24781->24783 24787 4f742d2 24782->24787 24785 4f74216 24783->24785 24769 4f74670 24770 4f747fb 24769->24770 24772 4f74696 24769->24772 24772->24770 24773 4f72458 24772->24773 24774 4f7245d PostMessageW 24773->24774 24776 4f7495c 24774->24776 24776->24772 24788 4f745d0 24789 4f74611 ResumeThread 24788->24789 24790 4f7463e 24789->24790 24791 2ebbe40 DuplicateHandle 24792 2ebbed6 24791->24792 24812 2eb6900 24813 2eb6910 24812->24813 24816 2eb5634 24813->24816 24815 2eb691d 24817 2eb563f 24816->24817 24820 2eb5654 24817->24820 24819 2eb69c5 24819->24815 24821 2eb565f 24820->24821 24824 2eb56fc 24821->24824 24823 2eb6aa2 24823->24819 24825 2eb5707 24824->24825 24828 2eb572c 24825->24828 24827 2eb6ba2 24827->24823 24829 2eb5737 24828->24829 24831 2eb72be 24829->24831 24835 2eb941f 24829->24835 24839 2eb9430 24829->24839 24830 2eb72fc 24830->24827 24831->24830 24843 2ebb539 24831->24843 24836 2eb943f 24835->24836 24849 2eb9519 24835->24849 24857 2eb9528 24835->24857 24836->24831 24841 2eb9519 2 API calls 24839->24841 24842 2eb9528 2 API calls 24839->24842 24840 2eb943f 24840->24831 24841->24840 24842->24840 24844 2ebb569 24843->24844 24845 2ebb58d 24844->24845 24877 2ebb6b5 24844->24877 24881 2ebb6e7 24844->24881 24885 2ebb6f8 24844->24885 24845->24830 24850 2eb953b 24849->24850 24851 2eb9553 24850->24851 24865 2eb97a0 24850->24865 24869 2eb97b0 24850->24869 24851->24836 24852 2eb954b 24852->24851 24853 2eb9750 GetModuleHandleW 24852->24853 24854 2eb977d 24853->24854 24854->24836 24858 2eb953b 24857->24858 24859 2eb9553 24858->24859 24863 2eb97a0 LoadLibraryExW 24858->24863 24864 2eb97b0 LoadLibraryExW 24858->24864 24859->24836 24860 2eb954b 24860->24859 24861 2eb9750 GetModuleHandleW 24860->24861 24862 2eb977d 24861->24862 24862->24836 24863->24860 24864->24860 24866 2eb97c4 24865->24866 24868 2eb97e9 24866->24868 24873 2eb88b0 24866->24873 24868->24852 24870 2eb97c4 24869->24870 24871 2eb97e9 24870->24871 24872 2eb88b0 LoadLibraryExW 24870->24872 24871->24852 24872->24871 24874 2eb9990 LoadLibraryExW 24873->24874 24876 2eb9a09 24874->24876 24876->24868 24878 2ebb6c2 24877->24878 24878->24845 24879 2ebb73f 24878->24879 24889 2eba22c 24878->24889 24879->24845 24882 2ebb6ef 24881->24882 24883 2ebb73f 24882->24883 24884 2eba22c 3 API calls 24882->24884 24883->24845 24884->24883 24886 2ebb705 24885->24886 24887 2ebb73f 24886->24887 24888 2eba22c 3 API calls 24886->24888 24887->24845 24888->24887 24890 2eba237 24889->24890 24892 2ebc438 24890->24892 24893 2ebba44 24890->24893 24892->24892 24894 2ebba4f 24893->24894 24895 2eb572c 3 API calls 24894->24895 24896 2ebc4a7 24894->24896 24895->24896 24900 2ebe218 24896->24900 24906 2ebe230 24896->24906 24897 2ebc4e0 24897->24892 24902 2ebe2ae 24900->24902 24903 2ebe261 24900->24903 24901 2ebe26d 24901->24897 24902->24897 24903->24901 24912 2ebe569 24903->24912 24915 2ebe578 24903->24915 24908 2ebe261 24906->24908 24909 2ebe2ae 24906->24909 24907 2ebe26d 24907->24897 24908->24907 24910 2ebe569 2 API calls 24908->24910 24911 2ebe578 2 API calls 24908->24911 24909->24897 24910->24909 24911->24909 24913 2eb9528 LoadLibraryExW GetModuleHandleW 24912->24913 24914 2ebe581 24913->24914 24914->24902 24916 2eb9528 LoadLibraryExW GetModuleHandleW 24915->24916 24917 2ebe581 24915->24917 24916->24917 24917->24902 24793 4f74258 24794 4f7429b VirtualAllocEx 24793->24794 24795 4f742d2 24794->24795 24796 4f73d58 24797 4f73dd7 CreateProcessW 24796->24797 24799 4f73ec0 24797->24799 24800 4f72dc6 24801 4f72de9 24800->24801 24803 4f74410 WriteProcessMemory 24801->24803 24804 4f74418 WriteProcessMemory 24801->24804 24802 4f72e0e 24803->24802 24804->24802 24805 2ebfd38 24806 2ebfda0 CreateWindowExW 24805->24806 24808 2ebfe5c 24806->24808 24808->24808 24918 4f74181 24919 4f74118 SetThreadContext 24918->24919 24921 4f74187 ReadProcessMemory 24918->24921 24922 4f7414e 24919->24922 24924 4f74216 24921->24924 24925 2ebb810 GetCurrentProcess 24926 2ebb88a GetCurrentThread 24925->24926 24927 2ebb883 24925->24927 24928 2ebb8c0 24926->24928 24929 2ebb8c7 GetCurrentProcess 24926->24929 24927->24926 24928->24929 24932 2ebb8fd 24929->24932 24930 2ebb925 GetCurrentThreadId 24931 2ebb956 24930->24931 24932->24930 24809 777daa8 24810 777daf0 VirtualProtect 24809->24810 24811 777db2a 24810->24811
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: <pl$<pl$D0pl
                                      • API String ID: 0-4250045148
                                      • Opcode ID: 0f3f2477de59ac3333fd3c034a33f3f114725db9733d14c0b5d5809a6fef47b6
                                      • Instruction ID: 5ab9781dea7e5666e81e68dfdaf29b886cbdcce0b412573a11f58ac614f02db4
                                      • Opcode Fuzzy Hash: 0f3f2477de59ac3333fd3c034a33f3f114725db9733d14c0b5d5809a6fef47b6
                                      • Instruction Fuzzy Hash: AE43E8B4A00219CFCF64DF68C988A9DB7B2BF89354F168595D919AB361DB30ED81CF40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Xp:J$g@
                                      • API String ID: 0-173761952
                                      • Opcode ID: 4327b5396503bbfb6fc7229336d163a9a50e8b7156bb39554a1e80fcae71804b
                                      • Instruction ID: b54ec9f45c18c58d11a2a267e15b457975490e09fc37f50b45a37b88a3e52cf9
                                      • Opcode Fuzzy Hash: 4327b5396503bbfb6fc7229336d163a9a50e8b7156bb39554a1e80fcae71804b
                                      • Instruction Fuzzy Hash: 7202AFB1A18206CFCB08CFA5D5858EEFBB2FF86391B158456D005AB205C734AA43CFD5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1000 7777f70-7777f95 1003 7777f97 1000->1003 1004 7777f9c-7777fd8 1000->1004 1003->1004 1078 7777fda call 77785c0 1004->1078 1079 7777fda call 77785b0 1004->1079 1008 7777fe0 1009 7777fe7-7778003 1008->1009 1010 7778005 1009->1010 1011 777800c-777800d 1009->1011 1010->1008 1010->1011 1012 7778372-7778376 1010->1012 1013 777807e-7778093 1010->1013 1014 777817c-7778193 1010->1014 1015 77782fb-777830f 1010->1015 1016 777827a-7778286 1010->1016 1017 77783b9-77783ce 1010->1017 1018 7778064-7778079 1010->1018 1019 77780e4-77780f0 1010->1019 1020 77783a2-77783b4 1010->1020 1021 777802b-777804b 1010->1021 1022 77781eb-77781f7 1010->1022 1023 77781aa-77781bc 1010->1023 1024 7778314-7778320 1010->1024 1025 77783d3-77783da 1010->1025 1026 7778012-7778029 1010->1026 1027 777821f-7778244 1010->1027 1028 7778098-77780a1 1010->1028 1029 7778118-777811c 1010->1029 1030 7778198-77781a5 1010->1030 1031 77781c1-77781cd 1010->1031 1032 777804d-7778062 1010->1032 1033 77780cd-77780df 1010->1033 1034 77782cb-77782cf 1010->1034 1035 7778249-7778275 1010->1035 1036 7778348-7778354 1010->1036 1037 7778148-7778154 1010->1037 1011->1025 1052 7778389-7778390 1012->1052 1053 7778378-7778387 1012->1053 1013->1009 1014->1009 1015->1009 1040 777828d-77782a3 1016->1040 1041 7778288 1016->1041 1017->1009 1018->1009 1050 77780f7-7778113 1019->1050 1051 77780f2 1019->1051 1020->1009 1021->1009 1038 77781fe-777821a 1022->1038 1039 77781f9 1022->1039 1023->1009 1044 7778327-7778343 1024->1044 1045 7778322 1024->1045 1026->1009 1027->1009 1046 77780b4-77780bb 1028->1046 1047 77780a3-77780b2 1028->1047 1054 777812f-7778136 1029->1054 1055 777811e-777812d 1029->1055 1030->1009 1058 77781d4-77781e6 1031->1058 1059 77781cf 1031->1059 1032->1009 1033->1009 1042 77782e2-77782e9 1034->1042 1043 77782d1-77782e0 1034->1043 1035->1009 1048 7778356 1036->1048 1049 777835b-777836d 1036->1049 1056 7778156 1037->1056 1057 777815b-7778177 1037->1057 1038->1009 1039->1038 1075 77782a5 1040->1075 1076 77782aa-77782c6 1040->1076 1041->1040 1062 77782f0-77782f6 1042->1062 1043->1062 1044->1009 1045->1044 1064 77780c2-77780c8 1046->1064 1047->1064 1048->1049 1049->1009 1050->1009 1051->1050 1065 7778397-777839d 1052->1065 1053->1065 1066 777813d-7778143 1054->1066 1055->1066 1056->1057 1057->1009 1058->1009 1059->1058 1062->1009 1064->1009 1065->1009 1066->1009 1075->1076 1076->1009 1078->1008 1079->1008
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Xp:J$g@
                                      • API String ID: 0-173761952
                                      • Opcode ID: a297d3a06b1a53254f1299558c547c2edd9855990be68b0133e0441c8cfedb77
                                      • Instruction ID: 7195c73bf2c15bbc21472ee9df0053b5efc418445aa9353328c84c851d26ccd0
                                      • Opcode Fuzzy Hash: a297d3a06b1a53254f1299558c547c2edd9855990be68b0133e0441c8cfedb77
                                      • Instruction Fuzzy Hash: 1AD15CB0E1420ADFCB08CFA5C5858AEFBB2FF8A340F15C559D416AB214D734A942CF95
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: `ol
                                      • API String ID: 0-1027905379
                                      • Opcode ID: 5bad69ff89324dcffc7d68e52da4f1a256386e3cfd2e4842bf1305f1bd4f6597
                                      • Instruction ID: 9b2bd38316568e77c92ae30fa6bfed1a8d010282682ed89b5c786cbf46e01d06
                                      • Opcode Fuzzy Hash: 5bad69ff89324dcffc7d68e52da4f1a256386e3cfd2e4842bf1305f1bd4f6597
                                      • Instruction Fuzzy Hash: FCC14A71E002598FCF14DFA5C844BEEBBB2BF8A314F1484A9D509AB251DB349E86CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: a#
                                      • API String ID: 0-3005849427
                                      • Opcode ID: 54d19e4cf47f92b2370d2c85572bb40479f447529392eee78d1ddc5180b5f8c9
                                      • Instruction ID: 70e072aec97cb25bf405760b8e5c174a346f588c8947d35560dafca390438dbe
                                      • Opcode Fuzzy Hash: 54d19e4cf47f92b2370d2c85572bb40479f447529392eee78d1ddc5180b5f8c9
                                      • Instruction Fuzzy Hash: 1691D4B4E146198FCB08CFA9C9856ADFBB2FF89300F14802AD519BB364D7359945CF64
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: a#
                                      • API String ID: 0-3005849427
                                      • Opcode ID: a25f08d53d682d50752315660fa037c9d8ddb8ee73018797cd4f3b7fc431fdbe
                                      • Instruction ID: eb81cd082c010f52766b1439f26daeacb01dce0342512583090433170041a57f
                                      • Opcode Fuzzy Hash: a25f08d53d682d50752315660fa037c9d8ddb8ee73018797cd4f3b7fc431fdbe
                                      • Instruction Fuzzy Hash: 5181C4B4E106198FCB08CFE9C984AADFBB2FF89300F14942AD519BB264D7359941CF54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 17d2b187fc50bb4084ba8d27ec551dd6e231855102540ce1ded455da04d9b5ba
                                      • Instruction ID: a7b01247e22ed4292c44a037ff34f1d3cab19c5ef10a7b785b4f1da1195b4dc8
                                      • Opcode Fuzzy Hash: 17d2b187fc50bb4084ba8d27ec551dd6e231855102540ce1ded455da04d9b5ba
                                      • Instruction Fuzzy Hash: 0EA113B4E152198BCF04CFA9CA815DEFBF2BF8A350F24D12AD414AB358D7349942CB65
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4b165bd5592baacabad26d80addcbd7e4f34abf9a8450c291cf961c6af794408
                                      • Instruction ID: 495571183008c5afa1473bb0ed83ed57a23d0113e8e895f5727745ffb425b64f
                                      • Opcode Fuzzy Hash: 4b165bd5592baacabad26d80addcbd7e4f34abf9a8450c291cf961c6af794408
                                      • Instruction Fuzzy Hash: F951D3B4E052599FCB04DFAAC9809AEFBF2BF89310F14C569E408A7355D734A942CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cc7d3592857e79df9b27f285a936a0d06a9e5d6d75b31db7c4cb9b7407bc8d6a
                                      • Instruction ID: df1e7224ff405b677936c952c182470ceb5260d9edbe29776fcd86adaeca4d9e
                                      • Opcode Fuzzy Hash: cc7d3592857e79df9b27f285a936a0d06a9e5d6d75b31db7c4cb9b7407bc8d6a
                                      • Instruction Fuzzy Hash: 2D5148B0E1561A8FDB08CFAAC4405AEFBF2EF89344F14C06AD415EB255D7348A02CF94
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 41d4bff84578c20fdbc816a2bb963055ce0220cef63091cad55a070e6da2573f
                                      • Instruction ID: 63284f3452275c86f4086033027c07fa252d4f49f16fdaaf64720064d7b11ca7
                                      • Opcode Fuzzy Hash: 41d4bff84578c20fdbc816a2bb963055ce0220cef63091cad55a070e6da2573f
                                      • Instruction Fuzzy Hash: 3851F5B0E156198FDB08CFAAC5406AEFBF2BB89340F14D46AD419A7254D7349A42CF94
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 37cc9b2cf55af30499d659f16de7d27005abbebad7ed6b89d6a7e2f0363bb1c0
                                      • Instruction ID: 7f0b03bb9ff6fd45d6bacf7bdc5acc02693a763f53615a9d141932c3e39c7ef4
                                      • Opcode Fuzzy Hash: 37cc9b2cf55af30499d659f16de7d27005abbebad7ed6b89d6a7e2f0363bb1c0
                                      • Instruction Fuzzy Hash: 143102B0E15218CBDB18CFAAD9446DEBBF6BFC9310F15C06AE409AB258DB345A45CF44
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9d81947b3b7b48bb7a500860a53f923a58d2c16412e5ff8e69391f48ba58dc3a
                                      • Instruction ID: a5478169263c98a2310e8d43e8a5d6d6011b3cbd59f7bc075e6664873b8a0b95
                                      • Opcode Fuzzy Hash: 9d81947b3b7b48bb7a500860a53f923a58d2c16412e5ff8e69391f48ba58dc3a
                                      • Instruction Fuzzy Hash: 1621AB31D052488FDB01CFA4D418BEDBBF1BB4A350F14906AD044BB261CB38998ADF24
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5d0f8ce42da468000a5580f1266dd996e85eb2642c66267f3c53f3c4b67d4231
                                      • Instruction ID: 107409b221d49b94d4efef213bb7f2f23f2d7145704f79d0062e61df78efb554
                                      • Opcode Fuzzy Hash: 5d0f8ce42da468000a5580f1266dd996e85eb2642c66267f3c53f3c4b67d4231
                                      • Instruction Fuzzy Hash: 103113B0E016588BDB18CFAAD9446DEBFF3AFC8300F14C06AD809AB258DB344A45CF44
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 767 2ebb801-2ebb881 GetCurrentProcess 768 2ebb88a-2ebb8be GetCurrentThread 767->768 769 2ebb883-2ebb889 767->769 770 2ebb8c0-2ebb8c6 768->770 771 2ebb8c7-2ebb8fb GetCurrentProcess 768->771 769->768 770->771 773 2ebb8fd-2ebb903 771->773 774 2ebb904-2ebb91f call 2ebbdc8 771->774 773->774 777 2ebb925-2ebb954 GetCurrentThreadId 774->777 778 2ebb95d-2ebb9bf 777->778 779 2ebb956-2ebb95c 777->779 779->778
                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 02EBB870
                                      • GetCurrentThread.KERNEL32 ref: 02EBB8AD
                                      • GetCurrentProcess.KERNEL32 ref: 02EBB8EA
                                      • GetCurrentThreadId.KERNEL32 ref: 02EBB943
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327545817.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2eb0000_attached PI.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: 54260e63afdb3dd7800145c451a472d6c1ecd8816f929980c3398c0ed5dd0ac6
                                      • Instruction ID: 69365e48c14e39366779b3d69c9fb90ccb0b6272e2e4555083e393cd65423b4a
                                      • Opcode Fuzzy Hash: 54260e63afdb3dd7800145c451a472d6c1ecd8816f929980c3398c0ed5dd0ac6
                                      • Instruction Fuzzy Hash: 3F5157B4E042498FDB14CFA9D688BEEBBF0BF48318F148499E559A7350C7359844CF65
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 786 2ebb810-2ebb881 GetCurrentProcess 787 2ebb88a-2ebb8be GetCurrentThread 786->787 788 2ebb883-2ebb889 786->788 789 2ebb8c0-2ebb8c6 787->789 790 2ebb8c7-2ebb8fb GetCurrentProcess 787->790 788->787 789->790 792 2ebb8fd-2ebb903 790->792 793 2ebb904-2ebb91f call 2ebbdc8 790->793 792->793 796 2ebb925-2ebb954 GetCurrentThreadId 793->796 797 2ebb95d-2ebb9bf 796->797 798 2ebb956-2ebb95c 796->798 798->797
                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 02EBB870
                                      • GetCurrentThread.KERNEL32 ref: 02EBB8AD
                                      • GetCurrentProcess.KERNEL32 ref: 02EBB8EA
                                      • GetCurrentThreadId.KERNEL32 ref: 02EBB943
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327545817.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2eb0000_attached PI.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: 0fe76c02c520486ac662e73f835ca6bf1ef99492941e9b97b3dc9ceab11cb208
                                      • Instruction ID: e123d4d7c90491321335cebc4646780a517bfa3b842915f63025d6e733be18e1
                                      • Opcode Fuzzy Hash: 0fe76c02c520486ac662e73f835ca6bf1ef99492941e9b97b3dc9ceab11cb208
                                      • Instruction Fuzzy Hash: C95123B4E002498FDB14CFAAD648BDEBBF1BF88318F248459E519A7250D7359844CF65
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 833 4f74181-4f74185 834 4f74187-4f74214 ReadProcessMemory 833->834 835 4f74118-4f7414c SetThreadContext 833->835 842 4f74216-4f7421c 834->842 843 4f7421d-4f7423e 834->843 838 4f74155-4f74176 835->838 839 4f7414e-4f74154 835->839 839->838 842->843
                                      APIs
                                      • SetThreadContext.KERNELBASE(?,00000000), ref: 04F7413F
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04F74207
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID: ContextMemoryProcessReadThread
                                      • String ID:
                                      • API String ID: 1264303914-0
                                      • Opcode ID: bd0ec26c13c728cd5f1f82e708b3e6c683aca8ba12a58d528e4989ab2a96421f
                                      • Instruction ID: 363141ce0a748dfb426fb8d3ea61a3716ac552f25aa2bbdcd728aa248d37b27a
                                      • Opcode Fuzzy Hash: bd0ec26c13c728cd5f1f82e708b3e6c683aca8ba12a58d528e4989ab2a96421f
                                      • Instruction Fuzzy Hash: D03125B1900219DFDB00CF9AD985BEEFBF4FB48324F14802AE558A3240D378A945CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 845 4f74251-4f74255 846 4f74257-4f742d0 VirtualAllocEx 845->846 847 4f741e8 845->847 853 4f742d2-4f742d8 846->853 854 4f742d9-4f742ed 846->854 848 4f741f2-4f74214 ReadProcessMemory 847->848 849 4f741ea-4f741f1 847->849 850 4f74216-4f7421c 848->850 851 4f7421d-4f7423e 848->851 849->848 850->851 853->854
                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04F74207
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04F742C3
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID: AllocMemoryProcessReadVirtual
                                      • String ID:
                                      • API String ID: 1100665700-0
                                      • Opcode ID: 1b074a217888585276bf015af486757401fddbe3aaf5b07c10f0ccbb2be14125
                                      • Instruction ID: f431bb10cd4a02098b49754b37be58e93c7701724e70ab91d73d21567e740dfa
                                      • Opcode Fuzzy Hash: 1b074a217888585276bf015af486757401fddbe3aaf5b07c10f0ccbb2be14125
                                      • Instruction Fuzzy Hash: 353145B6800258DFDF10CF9AD848BDEBBF4FB48324F14841AE628A3250C339A555CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1080 2eb9528-2eb953d call 2eb7014 1083 2eb953f 1080->1083 1084 2eb9553-2eb9557 1080->1084 1135 2eb9545 call 2eb97a0 1083->1135 1136 2eb9545 call 2eb97b0 1083->1136 1085 2eb956b-2eb95ac 1084->1085 1086 2eb9559-2eb9563 1084->1086 1091 2eb95b9-2eb95c7 1085->1091 1092 2eb95ae-2eb95b6 1085->1092 1086->1085 1087 2eb954b-2eb954d 1087->1084 1090 2eb9688-2eb9748 1087->1090 1128 2eb974a-2eb974d 1090->1128 1129 2eb9750-2eb977b GetModuleHandleW 1090->1129 1094 2eb95eb-2eb95ed 1091->1094 1095 2eb95c9-2eb95ce 1091->1095 1092->1091 1098 2eb95f0-2eb95f7 1094->1098 1096 2eb95d9 1095->1096 1097 2eb95d0-2eb95d7 call 2eb8854 1095->1097 1103 2eb95db-2eb95e9 1096->1103 1097->1103 1099 2eb95f9-2eb9601 1098->1099 1100 2eb9604-2eb960b 1098->1100 1099->1100 1104 2eb9618-2eb9621 call 2eb8864 1100->1104 1105 2eb960d-2eb9615 1100->1105 1103->1098 1110 2eb962e-2eb9633 1104->1110 1111 2eb9623-2eb962b 1104->1111 1105->1104 1113 2eb9651-2eb9655 1110->1113 1114 2eb9635-2eb963c 1110->1114 1111->1110 1133 2eb9658 call 2eb9aa8 1113->1133 1134 2eb9658 call 2eb9a80 1113->1134 1114->1113 1115 2eb963e-2eb964e call 2eb8874 call 2eb8884 1114->1115 1115->1113 1117 2eb965b-2eb965e 1119 2eb9681-2eb9687 1117->1119 1120 2eb9660-2eb967e 1117->1120 1120->1119 1128->1129 1130 2eb977d-2eb9783 1129->1130 1131 2eb9784-2eb9798 1129->1131 1130->1131 1133->1117 1134->1117 1135->1087 1136->1087
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 02EB976E
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327545817.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2eb0000_attached PI.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: bb87de9cfa2477b1a00c070035395e04addd065d4292e80584db3d183c10c47d
                                      • Instruction ID: b506e668574fdf9e314f71ae7d2ba9efc888bd74f8b9589706c1c12093094ebd
                                      • Opcode Fuzzy Hash: bb87de9cfa2477b1a00c070035395e04addd065d4292e80584db3d183c10c47d
                                      • Instruction Fuzzy Hash: 63713570A40B058FDB65DF2AD05479BB7F1BF88208F008A2DD58AD7A51D734E805CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1137 4f73d4d-4f73d55 1138 4f73d57-4f73de3 1137->1138 1139 4f73ce8-4f73cf8 1137->1139 1142 4f73de5-4f73deb 1138->1142 1143 4f73dee-4f73df5 1138->1143 1142->1143 1144 4f73df7-4f73dfd 1143->1144 1145 4f73e00-4f73e16 1143->1145 1144->1145 1146 4f73e21-4f73ebe CreateProcessW 1145->1146 1147 4f73e18-4f73e1e 1145->1147 1149 4f73ec7-4f73f3b 1146->1149 1150 4f73ec0-4f73ec6 1146->1150 1147->1146 1158 4f73f4d-4f73f54 1149->1158 1159 4f73f3d-4f73f43 1149->1159 1150->1149 1160 4f73f56-4f73f65 1158->1160 1161 4f73f6b 1158->1161 1159->1158 1160->1161 1163 4f73f6c 1161->1163 1163->1163
                                      APIs
                                      • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 04F73EAB
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 471679ef2a007dc21f28427b8e83bd6978553f918d9195cd7a8cc87428766f70
                                      • Instruction ID: 209883ba1d9578b2d4a5021baab255c229217a52602be3decf0ce88b1f081009
                                      • Opcode Fuzzy Hash: 471679ef2a007dc21f28427b8e83bd6978553f918d9195cd7a8cc87428766f70
                                      • Instruction Fuzzy Hash: 1D511872D00328DFDB24CF99C980BDDBBB1BF48314F15819AE948A7250DB356A89CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1164 4f73d58-4f73de3 1166 4f73de5-4f73deb 1164->1166 1167 4f73dee-4f73df5 1164->1167 1166->1167 1168 4f73df7-4f73dfd 1167->1168 1169 4f73e00-4f73e16 1167->1169 1168->1169 1170 4f73e21-4f73ebe CreateProcessW 1169->1170 1171 4f73e18-4f73e1e 1169->1171 1173 4f73ec7-4f73f3b 1170->1173 1174 4f73ec0-4f73ec6 1170->1174 1171->1170 1182 4f73f4d-4f73f54 1173->1182 1183 4f73f3d-4f73f43 1173->1183 1174->1173 1184 4f73f56-4f73f65 1182->1184 1185 4f73f6b 1182->1185 1183->1182 1184->1185 1187 4f73f6c 1185->1187 1187->1187
                                      APIs
                                      • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 04F73EAB
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 094430675f2c1add8dd3f6d72a17845a6fc05d1bb049e368d51372e06b3c8a49
                                      • Instruction ID: a716811e3fa9d0cc809f882970fc5c7ed6b677ac6f85deb24d00e020cdb8eedf
                                      • Opcode Fuzzy Hash: 094430675f2c1add8dd3f6d72a17845a6fc05d1bb049e368d51372e06b3c8a49
                                      • Instruction Fuzzy Hash: 39511871D00328DFDB64CF95C980BDEBBB1BF88314F15819AE948A7250DB356A89CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1188 2ebfd2e-2ebfd9e 1190 2ebfda9-2ebfdb0 1188->1190 1191 2ebfda0-2ebfda6 1188->1191 1192 2ebfdbb-2ebfdf3 1190->1192 1193 2ebfdb2-2ebfdb8 1190->1193 1191->1190 1194 2ebfdfb-2ebfe5a CreateWindowExW 1192->1194 1193->1192 1195 2ebfe5c-2ebfe62 1194->1195 1196 2ebfe63-2ebfe9b 1194->1196 1195->1196 1200 2ebfea8 1196->1200 1201 2ebfe9d-2ebfea0 1196->1201 1202 2ebfea9 1200->1202 1201->1200 1202->1202
                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02EBFE4A
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327545817.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2eb0000_attached PI.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: 41cccf7ec4ad6b639a00d49ba702abf651f4294cd5fe35eeac05dfafd5c3c2ae
                                      • Instruction ID: b66420d1c5071765490cb26c576376b847d424596b14873fc76ffab623bdb0fe
                                      • Opcode Fuzzy Hash: 41cccf7ec4ad6b639a00d49ba702abf651f4294cd5fe35eeac05dfafd5c3c2ae
                                      • Instruction Fuzzy Hash: 2B51CEB5D002489FDF15CFAAC984ADEBBB5BF88314F24812AE819AB211D7749845CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1203 2ebfd38-2ebfd9e 1204 2ebfda9-2ebfdb0 1203->1204 1205 2ebfda0-2ebfda6 1203->1205 1206 2ebfdbb-2ebfe5a CreateWindowExW 1204->1206 1207 2ebfdb2-2ebfdb8 1204->1207 1205->1204 1209 2ebfe5c-2ebfe62 1206->1209 1210 2ebfe63-2ebfe9b 1206->1210 1207->1206 1209->1210 1214 2ebfea8 1210->1214 1215 2ebfe9d-2ebfea0 1210->1215 1216 2ebfea9 1214->1216 1215->1214 1216->1216
                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02EBFE4A
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327545817.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2eb0000_attached PI.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: cc7b92ae7a6c7cc59b01971b6c3686fa51a581a3981bdbb86843c4f2201971b3
                                      • Instruction ID: 64f89248c032f24625fffcd664a6ac7af3abba00c01543ff6aa24fbba507ec64
                                      • Opcode Fuzzy Hash: cc7b92ae7a6c7cc59b01971b6c3686fa51a581a3981bdbb86843c4f2201971b3
                                      • Instruction Fuzzy Hash: 4B41BEB5D003099FDF15CF9AC984ADEBBB5FF88314F24822AE819AB211D7749945CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1217 4f723e6-4f723f3 1219 4f723f5-4f72419 1217->1219 1220 4f7245d-4f7495a PostMessageW 1217->1220 1225 4f723ac-4f723b1 1219->1225 1226 4f7241b-4f72439 1219->1226 1223 4f74963-4f74977 1220->1223 1224 4f7495c-4f74962 1220->1224 1224->1223 1230 4f723cc-4f723d1 1226->1230 1231 4f7243b-4f72449 1226->1231 1233 4f723dc-4f723e3 1231->1233 1234 4f7244b-4f72471 1231->1234 1233->1217 1237 4f72404-4f72409 1234->1237 1238 4f72473-4f72481 1234->1238 1239 4f7239c-4f723a3 1237->1239 1240 4f7240b 1237->1240 1242 4f72414-4f72419 1238->1242 1243 4f72483-4f724ab 1238->1243 1240->1242 1242->1225 1242->1226
                                      APIs
                                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 04F7494D
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: cd127d25c638546a58359f591014602ecf85990cced073486522d1de748a2340
                                      • Instruction ID: 1c0b0443c8838e5f846a33c288cfd666ac47222a92767d88c7f2423608645111
                                      • Opcode Fuzzy Hash: cd127d25c638546a58359f591014602ecf85990cced073486522d1de748a2340
                                      • Instruction Fuzzy Hash: CB31E5B68083858FDB01DFA9D8557CA7FF0EF59224F09449BD584E7242D338A845CBA6
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1245 4f748e8-4f748ed 1246 4f74880-4f748bf 1245->1246 1247 4f748ef-4f7495a PostMessageW 1245->1247 1251 4f748c1-4f748c7 1246->1251 1252 4f748c8-4f748dc 1246->1252 1249 4f74963-4f74977 1247->1249 1250 4f7495c-4f74962 1247->1250 1250->1249 1251->1252
                                      APIs
                                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 04F7494D
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: 8f062bedb85ff5777719bb50c01e0a1b64ca489bdda9fab38db00a50d0b27c9e
                                      • Instruction ID: 9ef341b696e41f1f12003be94bfe9a6e02e02624e9d928c1133b7e6fd396badb
                                      • Opcode Fuzzy Hash: 8f062bedb85ff5777719bb50c01e0a1b64ca489bdda9fab38db00a50d0b27c9e
                                      • Instruction Fuzzy Hash: 4F3124B5800249CFDB10CF99D489BEEFBF8FB48324F14841AD558A7600C378A545CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1255 4f74410-4f74415 1256 4f74417-4f74469 1255->1256 1257 4f743a8 1255->1257 1262 4f7446b-4f74477 1256->1262 1263 4f74479-4f744b2 WriteProcessMemory 1256->1263 1258 4f743af-4f743c0 1257->1258 1259 4f743aa 1257->1259 1259->1258 1262->1263 1264 4f744b4-4f744ba 1263->1264 1265 4f744bb-4f744dc 1263->1265 1264->1265
                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04F744A5
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: c978473a464086a091e87258ef5260ded5569656f996b7f000443ccccb8be8ff
                                      • Instruction ID: 0f7940127c7d2c89202ee6f0cfbc6f42c1d280339bfe4b33bcf121a479a6432c
                                      • Opcode Fuzzy Hash: c978473a464086a091e87258ef5260ded5569656f996b7f000443ccccb8be8ff
                                      • Instruction Fuzzy Hash: 993116B5E00249DFDB10CFA9D985BEEBBF4FB48314F00842AE918A7640D738A941CF65
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SetThreadContext.KERNELBASE(?,00000000), ref: 04F7413F
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID: ContextThread
                                      • String ID:
                                      • API String ID: 1591575202-0
                                      • Opcode ID: d02b71231ca4e786377786485624b67a1ef68e0f1190538cd18d029c7ea4e375
                                      • Instruction ID: 3b997b01357a0c21f889d5a2866f5ef78146e58a5a818036a6380dbfbe76f197
                                      • Opcode Fuzzy Hash: d02b71231ca4e786377786485624b67a1ef68e0f1190538cd18d029c7ea4e375
                                      • Instruction Fuzzy Hash: A12139B1E002199FCB00DF99D9857EEFBB4FB48324F05816AD418A3740D778A9458FA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04F744A5
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: e83cbdee39d6cd8d8854034ab0593cec9fad9ca7f44949d632c48dbf0382ec6f
                                      • Instruction ID: 5569d8663eb743332d7d0b1a877d968fe74e0a236e4cb6794bcca981182c6010
                                      • Opcode Fuzzy Hash: e83cbdee39d6cd8d8854034ab0593cec9fad9ca7f44949d632c48dbf0382ec6f
                                      • Instruction Fuzzy Hash: 6521F8B1900259DFDB10CF9AD885BDEBBF4FB48314F10842AE918A3750D778A945CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02EBBEC7
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327545817.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2eb0000_attached PI.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 3782c1fcfadbac74c950da8e64aec833f0c2256ee27ea4ce610768ac47559956
                                      • Instruction ID: 89988e2067e9b4040c47815d38e3b7adf4390532f3051011d004cf15de2e4803
                                      • Opcode Fuzzy Hash: 3782c1fcfadbac74c950da8e64aec833f0c2256ee27ea4ce610768ac47559956
                                      • Instruction Fuzzy Hash: FC21E0B59002489FDB10CFA9D584AEEBBF5EF48324F14846AE918A7210C379A945CF61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02EBBEC7
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327545817.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2eb0000_attached PI.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 08d128419d82fe39d9fba3c26cf8e892899921ac2b1294780eecd8bb35d765f5
                                      • Instruction ID: 102c9989049714e7afe674e7af3d17aa48ca08dab8db71b9ce601c2d5d549617
                                      • Opcode Fuzzy Hash: 08d128419d82fe39d9fba3c26cf8e892899921ac2b1294780eecd8bb35d765f5
                                      • Instruction Fuzzy Hash: B821C4B59002489FDB10CF9AD584ADEFBF4EF48324F14841AE914A3310D374A954CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04F74207
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: 61a561ff0650aadd82761c3c69c7d17bd9b89094ee49a749de5f4ab3547fc2cb
                                      • Instruction ID: 0347d43eed1794dd3ba60f3acffcc04ffedb147c4bb541f3b0078d2e79e1a33d
                                      • Opcode Fuzzy Hash: 61a561ff0650aadd82761c3c69c7d17bd9b89094ee49a749de5f4ab3547fc2cb
                                      • Instruction Fuzzy Hash: 8021E2B5900259DFCB10CF9AD884BDEFBF4FB48320F50842AE918A3250D378A955CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SetThreadContext.KERNELBASE(?,00000000), ref: 04F7413F
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID: ContextThread
                                      • String ID:
                                      • API String ID: 1591575202-0
                                      • Opcode ID: 36f0222663eafe429f8c41aa9449b4e955b2daf0cda4611a9b857d2191ad8531
                                      • Instruction ID: 91b18e94563e832fee33ac59a2af2c95d0324d84046b3788186807b40cac4034
                                      • Opcode Fuzzy Hash: 36f0222663eafe429f8c41aa9449b4e955b2daf0cda4611a9b857d2191ad8531
                                      • Instruction Fuzzy Hash: 092147B1E002199FCB00DF9AD8847EEFBF4FB48320F04812AE518A3340D778A9458FA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0777DB1B
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID:
                                      • API String ID: 544645111-0
                                      • Opcode ID: 0fe2a2f594fe7b453025972a72ab585f4884c655e7ab0e4fbaa9c392164732d9
                                      • Instruction ID: 22463a0d4b7f6d367e77875a34eb89daa9d2e316e129098ae42672bbad533072
                                      • Opcode Fuzzy Hash: 0fe2a2f594fe7b453025972a72ab585f4884c655e7ab0e4fbaa9c392164732d9
                                      • Instruction Fuzzy Hash: 6C21E4B59002499FCB10DF9AD984BDEFBF4FF48360F148429E558A7250D378A945CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02EB97E9,00000800,00000000,00000000), ref: 02EB99FA
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327545817.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2eb0000_attached PI.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: aa0d32529b553d29e85c283c98cd540621a4f08b22d3016fac737697a0a622ec
                                      • Instruction ID: 3e840340193bfa8c89c90dda9a2f0efe7e3e4ceaf3ec74d205a2438a0383462b
                                      • Opcode Fuzzy Hash: aa0d32529b553d29e85c283c98cd540621a4f08b22d3016fac737697a0a622ec
                                      • Instruction Fuzzy Hash: 9411F2B69002099FDB10CF9AD484BEEFBF4AB89314F04842AE559B7201C375A945CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02EB97E9,00000800,00000000,00000000), ref: 02EB99FA
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327545817.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2eb0000_attached PI.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: bedb85598d45302c0312450ec54cddf63136ef9dbec5673aab35aee3ab095a25
                                      • Instruction ID: fd83cfafc7f85c9254042aa2b077cb7710349ca93b6f5cd19333a51252df362b
                                      • Opcode Fuzzy Hash: bedb85598d45302c0312450ec54cddf63136ef9dbec5673aab35aee3ab095a25
                                      • Instruction Fuzzy Hash: 1B1123B6D002098FDB10CF9AD584BEEFBF4AF48324F14852AD559B7600C378A545CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: 80ba9931510494854e261e836e5bdf5427f0c621f6ce1fc28b24ab05f7fbfae9
                                      • Instruction ID: 3c72239c7d670480bab571385a2c101db40a9421b7a0c36eb873b64c70b5e11d
                                      • Opcode Fuzzy Hash: 80ba9931510494854e261e836e5bdf5427f0c621f6ce1fc28b24ab05f7fbfae9
                                      • Instruction Fuzzy Hash: 8C1102B5D00248CFCB10DF99D988BEEFBF4EB88324F10845AD919A3640D779A941CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04F742C3
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 813dcad909c23b2c360af6d0b7538e91898ffbeebed3ab9b6c5738f2a7b60a46
                                      • Instruction ID: 4013c4e55f1b2ef8f9d935d1be89f98cfc001fcb4bf586c4664a871e2c03005d
                                      • Opcode Fuzzy Hash: 813dcad909c23b2c360af6d0b7538e91898ffbeebed3ab9b6c5738f2a7b60a46
                                      • Instruction Fuzzy Hash: D211F2B5900249DFCB10DF9AD884BDEBBF4FB88324F14841AE629A7210C375A955CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 04F7494D
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: 638e89c12664da01206fec4d5c387f53bdca5e32fcfe73226cdce40a7c25ec97
                                      • Instruction ID: 8aaff146a37fc97e14f1c01e4ab3037834f57416638ccea0a08f3496a45e872a
                                      • Opcode Fuzzy Hash: 638e89c12664da01206fec4d5c387f53bdca5e32fcfe73226cdce40a7c25ec97
                                      • Instruction Fuzzy Hash: 7F1103B5900349DFDB10DF99D484BDFBBF8EB88320F10841AE555A7200D378A945CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 02EB976E
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327545817.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2eb0000_attached PI.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 73b1fce3a7047e3359ea10c185bd193bcad46757644c005437b0c1d0337b911e
                                      • Instruction ID: 4308b7a6491ed2b91f5d92df3f9ab6bf91e3549b9359b144a8917cb18015db64
                                      • Opcode Fuzzy Hash: 73b1fce3a7047e3359ea10c185bd193bcad46757644c005437b0c1d0337b911e
                                      • Instruction Fuzzy Hash: 49110FB5D002598FCB10CF9AD484BDFFBF4EF88228F14851AD529A7600C378A545CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: aa8fb3c6ef5bd637e773d3ff00b0eddb36dc5db4f403f8fe2b77cf4dc818cab2
                                      • Instruction ID: 93596cbe2fcb10979c871d52d11898fe990814a43b00e813b5210ab561104823
                                      • Opcode Fuzzy Hash: aa8fb3c6ef5bd637e773d3ff00b0eddb36dc5db4f403f8fe2b77cf4dc818cab2
                                      • Instruction Fuzzy Hash: 1D1123B18002488FCB10DF9AD888BDEFBF4EB48324F10841AD519A3340C378A945CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327236560.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_152d000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5290225dda9b87e71e8c78ebd13ae02a2d3d0d78de8f851b19257235a49cfaf4
                                      • Instruction ID: 73b2399d2eb4c9cbd6596fd507d24cf75f944f1966f2eb34e1a226e1597e363b
                                      • Opcode Fuzzy Hash: 5290225dda9b87e71e8c78ebd13ae02a2d3d0d78de8f851b19257235a49cfaf4
                                      • Instruction Fuzzy Hash: 0D21F4B2604240DFDB05DF54D9C0B2ABBB5FB88328F24C569D9094E296C376D855C6A2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327280186.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_153d000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 25230b5fcc41c64928dc27f91168948e8cb0fd00b1fc346cd57f50fb66f52617
                                      • Instruction ID: 2fc37e57599555e50c1f868e803ac72a1edf90be3e84eb38c3e28ee8ff7c4bec
                                      • Opcode Fuzzy Hash: 25230b5fcc41c64928dc27f91168948e8cb0fd00b1fc346cd57f50fb66f52617
                                      • Instruction Fuzzy Hash: D7210771504240DFDB01DF94D9C0B26BBB5FBC8324F64C96DE9494F242C736D846CA61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327280186.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_153d000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f809431ff683c52960aac7c1810781431134f3de3c4ff5cdcc41403d457f132f
                                      • Instruction ID: 1664c8017a78f1fb3b033e4eeebd70de4f09f27477942a455845e4c809b12190
                                      • Opcode Fuzzy Hash: f809431ff683c52960aac7c1810781431134f3de3c4ff5cdcc41403d457f132f
                                      • Instruction Fuzzy Hash: 682145B1604200DFDB10CF54D8C0B26FBB1FB88754F64C969D9494F242D336D806CA61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327280186.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_153d000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c3bc193daf458a25c5b4be1ac963f0954d215794c4eb47ecde60fe1385f0969d
                                      • Instruction ID: 712a57803eb3a632eedb2e8597a54caa61095358a62512267d895a1af949c1db
                                      • Opcode Fuzzy Hash: c3bc193daf458a25c5b4be1ac963f0954d215794c4eb47ecde60fe1385f0969d
                                      • Instruction Fuzzy Hash: B2218E755093808FDB02CF24D994B15FF71FB86214F28C5EAD8498F667C33A980ACB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327236560.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_152d000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1f7ac2f4481a1f3a02653cb926aa5f3ae966e0cf86c06822d5ce43077063c11a
                                      • Instruction ID: 597564c673e6389a7415233cbe47179e2e18e8357de0feae628ff162b00aaff0
                                      • Opcode Fuzzy Hash: 1f7ac2f4481a1f3a02653cb926aa5f3ae966e0cf86c06822d5ce43077063c11a
                                      • Instruction Fuzzy Hash: 3111AC76904280CFDB12CF58D9C4B1ABF71FB85324F28C6A9D9050B656C37AD45ACBA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327280186.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_153d000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3b0d54b04bcafd606d6a78c5bb14ac814209748032928deba834dc90cb86c9f1
                                      • Instruction ID: 90123c36b171f32af0498206f416484b9e2f125cefffae7325d783961cf7644d
                                      • Opcode Fuzzy Hash: 3b0d54b04bcafd606d6a78c5bb14ac814209748032928deba834dc90cb86c9f1
                                      • Instruction Fuzzy Hash: D9118B75904280DFDB12CF54D5C4B19BBB1FB84224F28C6A9E8494B656C33AD45ACB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327236560.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_152d000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3483973c799aae33f4d27d2e8364c851eb03601325b275bf3841496376923745
                                      • Instruction ID: 9d50d746cfe86b86a3bb918a6de5f6684d229c14edddc23bd398c9d194e0323d
                                      • Opcode Fuzzy Hash: 3483973c799aae33f4d27d2e8364c851eb03601325b275bf3841496376923745
                                      • Instruction Fuzzy Hash: 9201F7731083549AE7209B56CC84766BFE8FF46234F188459EE4C5F2C3C378A844CAB2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327236560.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_152d000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 91fe725957e30330c0cb967b7fa306cba46ff2ea9ecef8de1ef9ef58df32d7ea
                                      • Instruction ID: 4306b2e9d8684f33bd4bbdc51b9264ccba834fc1df89794176949be01dd21e1a
                                      • Opcode Fuzzy Hash: 91fe725957e30330c0cb967b7fa306cba46ff2ea9ecef8de1ef9ef58df32d7ea
                                      • Instruction Fuzzy Hash: 2CF068724042949EE7219A15CD84B66FFA8EB45674F18C45AEE085F286C3796844CAB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: %a#$Y22B$].
                                      • API String ID: 0-2739804514
                                      • Opcode ID: 4ad1603690c1199633042b80c33a14b5d3822f1ed07c60bde56466052d369967
                                      • Instruction ID: af32531e583cfec4eeeda014b3454654adc0a09bbbc414b7eaf4375fd65412b4
                                      • Opcode Fuzzy Hash: 4ad1603690c1199633042b80c33a14b5d3822f1ed07c60bde56466052d369967
                                      • Instruction Fuzzy Hash: 2371FA75E1560ACF8B04CFA5D6915AEBBF2EF89300F10952AD415BB314EB38A906CF94
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: %a#$Y22B$].
                                      • API String ID: 0-2739804514
                                      • Opcode ID: 79eddfb7888ebc54cf5146b436ceba712f16870e876e931130f2869b9c61ef9d
                                      • Instruction ID: e48ffab09e46302f26a3c27149448cef55685b6fa6e436e3270b139cb15ecb3d
                                      • Opcode Fuzzy Hash: 79eddfb7888ebc54cf5146b436ceba712f16870e876e931130f2869b9c61ef9d
                                      • Instruction Fuzzy Hash: 15710A75E1560ACFCB04CFA5D6915AEBBF2EF89300F10952AD415BB314EB38A906CF94
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Xcpl$Xcpl
                                      • API String ID: 0-4192977127
                                      • Opcode ID: 9deeea53cbfd926ff74d84a06f285746b589f1b818076042808850f14e30585e
                                      • Instruction ID: 6be8b6bd01340f4656f3a537173827e03891eff32c5fea4a88597064e407d6f5
                                      • Opcode Fuzzy Hash: 9deeea53cbfd926ff74d84a06f285746b589f1b818076042808850f14e30585e
                                      • Instruction Fuzzy Hash: A3B1E9B1B046968FCF19CF28C4986797BB2BF86384B1A8C6DD4559B352CB31EC41C792
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ]tNg$h+u?
                                      • API String ID: 0-1445872516
                                      • Opcode ID: fe0c20c80b02fb8bb4768abbea37ff853a55abd87c75c78de6bcfcd39cd12085
                                      • Instruction ID: b9274b359376461cc347f3781448534ad70718345351809313ae13632ffda4a3
                                      • Opcode Fuzzy Hash: fe0c20c80b02fb8bb4768abbea37ff853a55abd87c75c78de6bcfcd39cd12085
                                      • Instruction Fuzzy Hash: 7FD10A74E042199FCB14DFA8C5909AEFBF2FF4A305F24859AD508AB315DB34A942CF61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: _;n$_;n
                                      • API String ID: 0-3077585246
                                      • Opcode ID: 32654cac07bd78bd4b24067fc5c69fc4b0cef0a796d44bd621bfadbc56c2ee38
                                      • Instruction ID: 505d4c46ae11758fb310dc9f197848f23ec23635270f570d88e70e88403471bc
                                      • Opcode Fuzzy Hash: 32654cac07bd78bd4b24067fc5c69fc4b0cef0a796d44bd621bfadbc56c2ee38
                                      • Instruction Fuzzy Hash: 5B5148B5E1520A9FCF04CFA9C5806EEBBF2AF89350F54C425E514AB254D7349A42CFA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ]tNg
                                      • API String ID: 0-4143406751
                                      • Opcode ID: 02bff3153b48533399d49186c8411b694802ab0e8012f6291054a145eba6899e
                                      • Instruction ID: c2d050b76327ffadf69a51df67562f19fd76421792b82792cfb6e7aa8aca0276
                                      • Opcode Fuzzy Hash: 02bff3153b48533399d49186c8411b694802ab0e8012f6291054a145eba6899e
                                      • Instruction Fuzzy Hash: 5CE15074E042598FCB14DF69C5905AEFBF2FF8A305F24859AD408AB316D734A942CF61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ]tNg
                                      • API String ID: 0-4143406751
                                      • Opcode ID: 75fa75a40511e6323dc4cb9e916d7e7ebad38900bcca263a94cbbf7b3cb3086e
                                      • Instruction ID: 0c521ce3c9530dd08889d4a46653b1977d0d00e2bd16efcedf2a68f15240dfd0
                                      • Opcode Fuzzy Hash: 75fa75a40511e6323dc4cb9e916d7e7ebad38900bcca263a94cbbf7b3cb3086e
                                      • Instruction Fuzzy Hash: B0D14E74E042198FCB14DFA9C5909AEFBF2FF8A305F24856AD408AB315D734A942CF61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ]tNg
                                      • API String ID: 0-4143406751
                                      • Opcode ID: 312023e1c76da265ff94beeb619b05045bc4137a209de9913823e2e4b536b76d
                                      • Instruction ID: f8f135469b7415dfb32bb3b85a9910e6de2345dd8227ca0e21b2cc8736c090b0
                                      • Opcode Fuzzy Hash: 312023e1c76da265ff94beeb619b05045bc4137a209de9913823e2e4b536b76d
                                      • Instruction Fuzzy Hash: D7C11D74E042199FCB10DFA8C6909AEFBF2FF4A305F24855AD508AB316D734A942CF61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: O?1T
                                      • API String ID: 0-1734322053
                                      • Opcode ID: a372c00df9e05ac23514224f0dfd30dcb29621c21a6a74f937d1d3b36a3d28cc
                                      • Instruction ID: eaa3791dbc44c6e1530a13f99831f878eb996455c290ef0e73347ebccd6703a9
                                      • Opcode Fuzzy Hash: a372c00df9e05ac23514224f0dfd30dcb29621c21a6a74f937d1d3b36a3d28cc
                                      • Instruction Fuzzy Hash: 576112B4E152098FEF04CFA9C9849EEFBF2BF89250F24946AD405BB314D7359A41CB64
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: O?1T
                                      • API String ID: 0-1734322053
                                      • Opcode ID: c30b53e15b6b10772eba8fac7448256153754feef6c5f5889e3ebbdccaafdd1f
                                      • Instruction ID: 1dea14f359c5a3c8712ccfdb34a98e7529f61e2d4bb32e0a018d201d7b74294d
                                      • Opcode Fuzzy Hash: c30b53e15b6b10772eba8fac7448256153754feef6c5f5889e3ebbdccaafdd1f
                                      • Instruction Fuzzy Hash: 0061E0B4E146198FEF04CFA9C9849DEFBF2BF89250F24942AD405BB314D7359A41CB68
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      • xqrIH7dyYqacMzR_CjGA5JAR0vUKiq1f0DFqS1mcI=, xrefs: 07776B9A
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: xqrIH7dyYqacMzR_CjGA5JAR0vUKiq1f0DFqS1mcI=
                                      • API String ID: 0-1807698885
                                      • Opcode ID: 7cbc1658544a23a0b4e2e80ba3de4c23177700b668d9da6091bd29341ed07f16
                                      • Instruction ID: 891f0c4b2b3ea0dab11d72b90d7e60015d3f0267840491ab3ec64144d0d611fd
                                      • Opcode Fuzzy Hash: 7cbc1658544a23a0b4e2e80ba3de4c23177700b668d9da6091bd29341ed07f16
                                      • Instruction Fuzzy Hash: E66115B4E1160ADBCF04CF99D4809AEFBB1FB8A350F208529E515FB254D734AA41CF94
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      • xqrIH7dyYqacMzR_CjGA5JAR0vUKiq1f0DFqS1mcI=, xrefs: 07776B9A
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: xqrIH7dyYqacMzR_CjGA5JAR0vUKiq1f0DFqS1mcI=
                                      • API String ID: 0-1807698885
                                      • Opcode ID: cef801ac4aaeee8a9d1a55fbd546509aee787951fead9e2567d4cebe5103d6ad
                                      • Instruction ID: 92f9dde868131d0f051e77aa144f0dd82f6f54bf65bf80f57a6af8d75c1f1ca6
                                      • Opcode Fuzzy Hash: cef801ac4aaeee8a9d1a55fbd546509aee787951fead9e2567d4cebe5103d6ad
                                      • Instruction Fuzzy Hash: FD6126B4E1560ADFCF04CF99D4809AEFBB1FB8A350F248526E505EB264D734AA41CF94
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327545817.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2eb0000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0d60bb16110a04f5de29110ea6d34ce1f812e9f29dd5138e4db9aedaa59fb0c6
                                      • Instruction ID: a5d82674d6fb5526e8ebd99f67d290244e6e1cf9601a4fc7954de99d40a86680
                                      • Opcode Fuzzy Hash: 0d60bb16110a04f5de29110ea6d34ce1f812e9f29dd5138e4db9aedaa59fb0c6
                                      • Instruction Fuzzy Hash: 3F12D6F1CD37668AEB10CF66F9981893B60B745328BD14A09D261AFAD0D7B401EECF44
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327545817.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2eb0000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f337c3b467b2eed7cb91fe68f6066ba3d7ae84239dba018d8f8c3f48cd21877a
                                      • Instruction ID: c8c1d9ad77222175b370932ee96747e72cab9fd75c0b13fdb2825d5038119399
                                      • Opcode Fuzzy Hash: f337c3b467b2eed7cb91fe68f6066ba3d7ae84239dba018d8f8c3f48cd21877a
                                      • Instruction Fuzzy Hash: 1BA18C36E40209CFCF06DFA5C8445DEBBB2FF89304B15916AE905AB224EB71A955CF40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.327545817.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_2eb0000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 023fdf71c12354ce0d0105e9e331321cd3feae8f82a0392d87c6b1b5b3cb5ce8
                                      • Instruction ID: 61e0a417c1bcf9b76984e102d7a39ccb9b37cdc52bc7c21296e62ceb0a2cd8eb
                                      • Opcode Fuzzy Hash: 023fdf71c12354ce0d0105e9e331321cd3feae8f82a0392d87c6b1b5b3cb5ce8
                                      • Instruction Fuzzy Hash: E4C15BB1CD27668ADB10CF66F9981893B71BB85328FD14B09D261AF6D0D7B410EACF44
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8f722bf81ed5c6ce92716c6bd657046821e595d57a61502e0071169f273e373b
                                      • Instruction ID: 23d37e98db706284431f7ee87e818ae8e939522fe129c5b394a765cd27b23a40
                                      • Opcode Fuzzy Hash: 8f722bf81ed5c6ce92716c6bd657046821e595d57a61502e0071169f273e373b
                                      • Instruction Fuzzy Hash: E381E3B4A11219CFCB44CF99C58499EFBF2FF89350F248469E815AB324D734AA42CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b33f30a04ddac3b180c178e5923bef40b8f7dd999f1531c7fe0862328346afc4
                                      • Instruction ID: ba07668a7c26874c763632260d7a44b9b121100c0dce0651714ef3a6a6ded98e
                                      • Opcode Fuzzy Hash: b33f30a04ddac3b180c178e5923bef40b8f7dd999f1531c7fe0862328346afc4
                                      • Instruction Fuzzy Hash: A081E4B4E1521ACFCB44CFA9C5849AEFBF2FF89250F248569D415AB320D334AA42CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 21c57bb9c9e9fe53f8507fe61962d957e50e8c06f82b51b5b738a38901d59623
                                      • Instruction ID: b5e5b0f649bbe9e22e318b44270874c8c57cbc96d8fda4b5f260bb077665e9ec
                                      • Opcode Fuzzy Hash: 21c57bb9c9e9fe53f8507fe61962d957e50e8c06f82b51b5b738a38901d59623
                                      • Instruction Fuzzy Hash: 05512971E1562A8BDB24CF29C9447D9B7B2FFD9300F0582EAD50DA7614EB345A82DF40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 31c7b932f51fbd1014af3a037d2a60433c0083ceab6bea53a38da4a16b87f089
                                      • Instruction ID: 1d0e51ca8e890a58bde30176e14504551dbece29ed9a6d23746e96c7560abc56
                                      • Opcode Fuzzy Hash: 31c7b932f51fbd1014af3a037d2a60433c0083ceab6bea53a38da4a16b87f089
                                      • Instruction Fuzzy Hash: 944137B0E1560A8BDF08CFA9C5814AEFBF2FF89340F24D56AC515B7214D7349A42CB95
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b71af32ba529d28770707583c152e3802fd7942e6cdd79bc54cd74e98896b56d
                                      • Instruction ID: e258a1980edc52b9f0d104feb5032ca77e4d0d660c0e822868a8e627e44056b0
                                      • Opcode Fuzzy Hash: b71af32ba529d28770707583c152e3802fd7942e6cdd79bc54cd74e98896b56d
                                      • Instruction Fuzzy Hash: C24110B0E1560A9BDF08CFAAC5815AEFBF2FB89340F25D46AC405B7214E7309A41CF95
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ae0c5dd9249ba8733ad6a5806f1396afbd31c06e04399739a49c263473a0ff95
                                      • Instruction ID: 41a3f1949051537ad3ced7c89ce36a9ca7086af762c94b6087d6a8191fbbb94c
                                      • Opcode Fuzzy Hash: ae0c5dd9249ba8733ad6a5806f1396afbd31c06e04399739a49c263473a0ff95
                                      • Instruction Fuzzy Hash: FD41F5B1E1460A9FDF04CFAAC4815AEFBB2BF89350F24C469C415BB254E7349A42CF94
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8e5cc166678925e6d76d3a2180f40946ff391e72ba5479901586938588ced4c7
                                      • Instruction ID: abb411491518a1fcdc4f81306c989a9acbd008077c2590c999829f17112b5c4c
                                      • Opcode Fuzzy Hash: 8e5cc166678925e6d76d3a2180f40946ff391e72ba5479901586938588ced4c7
                                      • Instruction Fuzzy Hash: 494128B1E1420A8FDF04CFAAC4815AEFBB2FF89350F24C46AC415AB255E7349642CF94
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0bc153ffffa787d93e25cba1303c3ed7b03e4a8db6f9d9740c15ed488976afe4
                                      • Instruction ID: 5409cbf25ba8c0ef08f2fcdda0bfe6afb8beb4c828acf14d9d35b3d4298e774e
                                      • Opcode Fuzzy Hash: 0bc153ffffa787d93e25cba1303c3ed7b03e4a8db6f9d9740c15ed488976afe4
                                      • Instruction Fuzzy Hash: 6F413B71E1162A8BCB24CF69CD84799B7F2BFD9300F0586EAD409A7614EB305AC5DF44
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dc984602bf1b88847cd7f3e7effd4083426736133f0a636709ae4da564c40530
                                      • Instruction ID: 94a8f1eb22fea28d99312fc5043922e7bf84af055c172bca0453497521b752df
                                      • Opcode Fuzzy Hash: dc984602bf1b88847cd7f3e7effd4083426736133f0a636709ae4da564c40530
                                      • Instruction Fuzzy Hash: 0B415DB1E156188BDB18CF6B994429EFBF3AFC9300F14C1BA950CA6214EB3059868F15
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.335307577.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_4f70000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5d9159b2c151c93ba68b3cea913ebac8535b0171f6a2cef43089f139bcd8e1d4
                                      • Instruction ID: 91f1489edee53984a4cc770fb7520af24c4406ba99e0a9c039953a3e60226052
                                      • Opcode Fuzzy Hash: 5d9159b2c151c93ba68b3cea913ebac8535b0171f6a2cef43089f139bcd8e1d4
                                      • Instruction Fuzzy Hash: 51414A71E1062A8BCB28CF65CD44799B7B2FFD8300F0582EAD408A7614EB305AC6CF44
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2bf080aecc316de783a968c727e6f0b14d8a7633bb4f034f5f4b742df326702f
                                      • Instruction ID: 4ce2bd5f828c47224b401e478b94cf260fc2bcd30c1894b931415c94dcd1c268
                                      • Opcode Fuzzy Hash: 2bf080aecc316de783a968c727e6f0b14d8a7633bb4f034f5f4b742df326702f
                                      • Instruction Fuzzy Hash: E8315CB0E112199BDB54CF6AD940A9EFBF3FBC9210F14C46AD508A7314D7304A42CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 45851119cb8e6dcd97afa38e565b39a1940fda50ed47f4c84035b0692591ccef
                                      • Instruction ID: f12ad8cef97d96c727f1eed1cde3a37975a913fb37874d8c46a8607f89ceead8
                                      • Opcode Fuzzy Hash: 45851119cb8e6dcd97afa38e565b39a1940fda50ed47f4c84035b0692591ccef
                                      • Instruction Fuzzy Hash: 5C21F9B1E006189BEB58DFABD94069EFBF3AFC9200F04C0AAD508B6214DB345945CF25
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 52d9f04a126d0f20eb2d404f063a2aa97987e928ecc802147b5b06ce6db04cf9
                                      • Instruction ID: 0e9a036202fcf27f4d90ce76923ece3c68b98de9f8454cf9efa9a4449cd6fa90
                                      • Opcode Fuzzy Hash: 52d9f04a126d0f20eb2d404f063a2aa97987e928ecc802147b5b06ce6db04cf9
                                      • Instruction Fuzzy Hash: A81117B1E102199BDB58CFAAD8416AEFBF7AFC9310F14C47AD508A7214DB305A42CF95
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f86d8cacd19d0283897ff8b16640101e24ed0941899aa69eda0d668ea0bbb0a5
                                      • Instruction ID: 16b27d91371eaec91fd4896eb322c4d5085a8eb9fbc1537dd5ed45cc81ab453a
                                      • Opcode Fuzzy Hash: f86d8cacd19d0283897ff8b16640101e24ed0941899aa69eda0d668ea0bbb0a5
                                      • Instruction Fuzzy Hash: E111DAB1E056188BEF08CFABD84469EFBF7AFC8200F04C17AC918A6224EB341556CF55
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8faab93718f5f3efb6975b4e3718ceb395020505441932d7896306b81f99eb2b
                                      • Instruction ID: ab610d47ab9749955e8aadc9b0ecb6c720756f6636a91b1932729dc285a5cee4
                                      • Opcode Fuzzy Hash: 8faab93718f5f3efb6975b4e3718ceb395020505441932d7896306b81f99eb2b
                                      • Instruction Fuzzy Hash: B711CCB1E056588BEB08CF6BD94469EFBF3AFC8200F08C17AC808AA255DB3405468F55
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.342518635.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7770000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b96d364166422be96ed618fe9ce06d7331e02d01c9e5174ec26872f027c1e312
                                      • Instruction ID: 659d2be2717d192af71c3da50ef4116d36d9f22678d4659119e5cbcdbc44acab
                                      • Opcode Fuzzy Hash: b96d364166422be96ed618fe9ce06d7331e02d01c9e5174ec26872f027c1e312
                                      • Instruction Fuzzy Hash: 6E11DDB1E046588BEB49CF6BDD4469EFAF3AFC8200F08C07AC918B6254DB344542CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Execution Graph

                                      Execution Coverage:11.2%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:117
                                      Total number of Limit Nodes:4
                                      execution_graph 16323 2c86758 16325 2c86766 16323->16325 16326 2c86344 16323->16326 16327 2c8634f 16326->16327 16330 2c86394 16327->16330 16329 2c8688d 16329->16325 16331 2c8639f 16330->16331 16334 2c863c4 16331->16334 16333 2c86962 16333->16329 16335 2c863cf 16334->16335 16338 2c863f4 16335->16338 16337 2c86a62 16337->16333 16340 2c863ff 16338->16340 16339 2c871bc 16339->16337 16340->16339 16343 2c8b408 16340->16343 16348 2c8b3f9 16340->16348 16344 2c8b429 16343->16344 16345 2c8b44d 16344->16345 16353 2c8b5b8 16344->16353 16357 2c8b5aa 16344->16357 16345->16339 16350 2c8b408 16348->16350 16349 2c8b44d 16349->16339 16350->16349 16351 2c8b5b8 6 API calls 16350->16351 16352 2c8b5aa 6 API calls 16350->16352 16351->16349 16352->16349 16354 2c8b5c5 16353->16354 16355 2c8b5ff 16354->16355 16361 2c8a0ec 16354->16361 16355->16345 16358 2c8b5b2 16357->16358 16359 2c8b5ff 16358->16359 16360 2c8a0ec 6 API calls 16358->16360 16359->16345 16360->16359 16362 2c8a0f7 16361->16362 16364 2c8c2f8 16362->16364 16365 2c8b904 16362->16365 16364->16364 16366 2c8b90f 16365->16366 16367 2c863f4 6 API calls 16366->16367 16368 2c8c367 16367->16368 16375 2c8c3d1 16368->16375 16379 2c8c3e0 16368->16379 16369 2c8c375 16373 2c8e0d8 LoadLibraryExW GetModuleHandleW CreateWindowExW CreateWindowExW 16369->16373 16374 2c8e0f0 LoadLibraryExW GetModuleHandleW CreateWindowExW CreateWindowExW 16369->16374 16370 2c8c3a0 16370->16364 16373->16370 16374->16370 16376 2c8c40e 16375->16376 16377 2c8c4da KiUserCallbackDispatcher 16376->16377 16378 2c8c4df 16376->16378 16377->16378 16381 2c8c40e 16379->16381 16380 2c8c4df 16381->16380 16382 2c8c4da KiUserCallbackDispatcher 16381->16382 16382->16380 16409 69314a0 16410 69314ad 16409->16410 16411 69314b1 16409->16411 16414 69316b8 16411->16414 16415 69316c0 16414->16415 16419 2c8edef 16415->16419 16424 2c8ee00 16415->16424 16420 2c8ee2a 16419->16420 16421 2c8eed1 16420->16421 16429 2c8fba8 16420->16429 16432 2c8fb61 16420->16432 16425 2c8ee2a 16424->16425 16426 2c8eed1 16425->16426 16427 2c8fba8 CreateWindowExW 16425->16427 16428 2c8fb61 2 API calls 16425->16428 16427->16426 16428->16426 16440 2c8da04 16429->16440 16433 2c8fb8a 16432->16433 16434 2c8fbe6 CreateWindowExW 16432->16434 16433->16434 16435 2c8fbae 16433->16435 16439 2c8fd1c 16434->16439 16436 2c8fbdd 16435->16436 16437 2c8da04 CreateWindowExW 16435->16437 16436->16421 16437->16436 16441 2c8fbf8 CreateWindowExW 16440->16441 16443 2c8fd1c 16441->16443 16383 2c8b6d0 16384 2c8b736 16383->16384 16388 2c8bc88 16384->16388 16392 2c8bc98 16384->16392 16385 2c8b7e5 16389 2c8bc96 16388->16389 16396 2c8a14c 16389->16396 16393 2c8bcbb 16392->16393 16394 2c8a14c DuplicateHandle 16393->16394 16395 2c8bcc6 16394->16395 16395->16385 16397 2c8bd00 DuplicateHandle 16396->16397 16398 2c8bcc6 16397->16398 16398->16385 16399 2c8fe10 16402 2c8da3c 16399->16402 16403 2c8fe40 SetWindowLongW 16402->16403 16404 2c8fe28 16403->16404 16444 2c892f0 16448 2c893e8 16444->16448 16456 2c893d9 16444->16456 16445 2c892ff 16449 2c893fb 16448->16449 16450 2c89413 16449->16450 16464 2c89660 16449->16464 16468 2c89670 16449->16468 16450->16445 16451 2c8940b 16451->16450 16452 2c89610 GetModuleHandleW 16451->16452 16453 2c8963d 16452->16453 16453->16445 16457 2c893fb 16456->16457 16459 2c89413 16457->16459 16462 2c89660 LoadLibraryExW 16457->16462 16463 2c89670 LoadLibraryExW 16457->16463 16458 2c8940b 16458->16459 16460 2c89610 GetModuleHandleW 16458->16460 16459->16445 16461 2c8963d 16460->16461 16461->16445 16462->16458 16463->16458 16465 2c89670 16464->16465 16467 2c896a9 16465->16467 16472 2c88768 16465->16472 16467->16451 16469 2c89684 16468->16469 16470 2c896a9 16469->16470 16471 2c88768 LoadLibraryExW 16469->16471 16470->16451 16471->16470 16474 2c89850 LoadLibraryExW 16472->16474 16475 2c898c9 16474->16475 16475->16467 16405 69318fc 16406 6933610 DnsQuery_A 16405->16406 16408 693374a 16406->16408

                                      Control-flow Graph

                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 02C8962E
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.561793604.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_2c80000_attached PI.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 8426f81e9901a35de779adb21439f5e682f6206f7f8a113bfbae2360e4459469
                                      • Instruction ID: 51003d617de06dd79e2bc82f6386607ca31ecc3d575d636ad0cf7a1519918525
                                      • Opcode Fuzzy Hash: 8426f81e9901a35de779adb21439f5e682f6206f7f8a113bfbae2360e4459469
                                      • Instruction Fuzzy Hash: 207126B0A00B058FD764EF2AD44576ABBF1BF88218F008A2DE58AD7B50D735E945CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 58 2c8fb61-2c8fb88 59 2c8fb8a-2c8fbac 58->59 60 2c8fbec-2c8fc5e 58->60 63 2c8fbae-2c8fbd5 59->63 64 2c8fbe6-2c8fbea 59->64 61 2c8fc69-2c8fc70 60->61 62 2c8fc60-2c8fc66 60->62 65 2c8fc7b-2c8fd1a CreateWindowExW 61->65 66 2c8fc72-2c8fc78 61->66 62->61 67 2c8fbdd-2c8fbde 63->67 68 2c8fbd8 call 2c8da04 63->68 64->60 70 2c8fd1c-2c8fd22 65->70 71 2c8fd23-2c8fd5b 65->71 66->65 68->67 70->71 75 2c8fd68 71->75 76 2c8fd5d-2c8fd60 71->76 77 2c8fd69 75->77 76->75 77->77
                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02C8FD0A
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.561793604.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_2c80000_attached PI.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: 1d98c7e0e1d96c823a8132b12c280f510d6ac6c401e554e113abac71255bca6d
                                      • Instruction ID: 2bf18d6920995f0dc209e084041a38c121b2a6ce13b86490730fefd498c6999a
                                      • Opcode Fuzzy Hash: 1d98c7e0e1d96c823a8132b12c280f510d6ac6c401e554e113abac71255bca6d
                                      • Instruction Fuzzy Hash: AF6136B1C04349AFDF02CFA9D980ADEBFB1BF4A304F19815AE948AB221D3359945CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 78 69318fc-6933683 81 6933685-693368f 78->81 82 69336bc-6933748 DnsQuery_A 78->82 81->82 83 6933691-6933693 81->83 91 6933751-693379e 82->91 92 693374a-6933750 82->92 84 69336b6-69336b9 83->84 85 6933695-693369f 83->85 84->82 87 69336a3-69336b2 85->87 88 69336a1 85->88 87->87 90 69336b4 87->90 88->87 90->84 97 69337a0-69337a4 91->97 98 69337ae-69337b2 91->98 92->91 97->98 99 69337a6 97->99 100 69337c1-69337c5 98->100 101 69337b4-69337b7 98->101 99->98 102 69337c7-69337d3 100->102 103 69337d6 100->103 101->100 102->103
                                      APIs
                                      • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06933738
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.587108102.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: true
                                      • Associated: 0000000A.00000002.586982488.0000000006920000.00000004.08000000.00040000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_6920000_attached PI.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Query_
                                      • String ID:
                                      • API String ID: 428220571-0
                                      • Opcode ID: de307af3b607520949c181c0e5fb8723c888ad19655c05ffd208089ae62139a1
                                      • Instruction ID: a1a868f7877a46afdfc0dbc4eb46bdf583e9d2f625848a6953b4fdec5d09c687
                                      • Opcode Fuzzy Hash: de307af3b607520949c181c0e5fb8723c888ad19655c05ffd208089ae62139a1
                                      • Instruction Fuzzy Hash: 235123B1D00268CFCB50CFA9C9846DEBBB5FF48314F24812AE805AB750DB759845CF92
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 105 2c8da04-2c8fc5e 107 2c8fc69-2c8fc70 105->107 108 2c8fc60-2c8fc66 105->108 109 2c8fc7b-2c8fd1a CreateWindowExW 107->109 110 2c8fc72-2c8fc78 107->110 108->107 112 2c8fd1c-2c8fd22 109->112 113 2c8fd23-2c8fd5b 109->113 110->109 112->113 117 2c8fd68 113->117 118 2c8fd5d-2c8fd60 113->118 119 2c8fd69 117->119 118->117 119->119
                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02C8FD0A
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.561793604.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_2c80000_attached PI.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: 1ef566a08ab0a1b4c2257a49d27336388bda89bc3dc0516e008db3c2e3e1deb0
                                      • Instruction ID: b5457cd80da142a98108cb47883b1d67d2b0fdff12b06a554172f6c1fe6b254f
                                      • Opcode Fuzzy Hash: 1ef566a08ab0a1b4c2257a49d27336388bda89bc3dc0516e008db3c2e3e1deb0
                                      • Instruction Fuzzy Hash: 9C51EEB1D003099FDB14CF99C980ADEBBB5FF88314F64812EE919AB210D7759945CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 120 2c8a14c-2c8bd94 DuplicateHandle 122 2c8bd9d-2c8bdba 120->122 123 2c8bd96-2c8bd9c 120->123 123->122
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02C8BCC6,?,?,?,?,?), ref: 02C8BD87
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.561793604.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_2c80000_attached PI.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 9ac3f37eac1ac4fcaf5a5a2a558cb588436820986b11d474d380c92c701ecd3b
                                      • Instruction ID: eb35e9610873eea374755b8ebcc64a37c92a6afd47a2a5e23869c82437dc3726
                                      • Opcode Fuzzy Hash: 9ac3f37eac1ac4fcaf5a5a2a558cb588436820986b11d474d380c92c701ecd3b
                                      • Instruction Fuzzy Hash: A321E4B5900218EFDB10DF9AD984ADEFBF4EB48324F14841AE958A3310D378A954CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 126 2c8bcf9 127 2c8bd00-2c8bd94 DuplicateHandle 126->127 128 2c8bd9d-2c8bdba 127->128 129 2c8bd96-2c8bd9c 127->129 129->128
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02C8BCC6,?,?,?,?,?), ref: 02C8BD87
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.561793604.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_2c80000_attached PI.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: cd8261960d268c49d3746ccc5267b717c0c2d5168af78564c9a21ec7ce1300ff
                                      • Instruction ID: 0a9f7e392ef682440fec37e9b3172b4e66a1d32b72ea53b944ec0fb63b28d61b
                                      • Opcode Fuzzy Hash: cd8261960d268c49d3746ccc5267b717c0c2d5168af78564c9a21ec7ce1300ff
                                      • Instruction Fuzzy Hash: F821E6B5900259AFDB10CFA9D584ADEBFF4EB48314F14841AE958A7310D375A944CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 132 2c88768-2c89890 134 2c89898-2c898c7 LoadLibraryExW 132->134 135 2c89892-2c89895 132->135 136 2c898c9-2c898cf 134->136 137 2c898d0-2c898ed 134->137 135->134 136->137
                                      APIs
                                      • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,02C896A9,00000800,00000000,00000000), ref: 02C898BA
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.561793604.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_2c80000_attached PI.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 7d9b68b3cf24bf330df7c661e62debdb14f524e9a3a03f71cd29ef4418ad237f
                                      • Instruction ID: 6d06f923567456dd3624dd676f18dc6de1f00b6bbdb6b20aa04130e4be75eca9
                                      • Opcode Fuzzy Hash: 7d9b68b3cf24bf330df7c661e62debdb14f524e9a3a03f71cd29ef4418ad237f
                                      • Instruction Fuzzy Hash: 5711C2B69002099BDB10DF9AD444AEEBBF4AB89328F14842AE519A7700C375A945CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 140 2c89849-2c89890 141 2c89898-2c898c7 LoadLibraryExW 140->141 142 2c89892-2c89895 140->142 143 2c898c9-2c898cf 141->143 144 2c898d0-2c898ed 141->144 142->141 143->144
                                      APIs
                                      • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,02C896A9,00000800,00000000,00000000), ref: 02C898BA
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.561793604.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_2c80000_attached PI.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: e0fb295223f4e860c033cbc71566924fd772e91d6c138856920e52f9a2ab716f
                                      • Instruction ID: a2c95a08dc1dae11fb2ee2b647a4d3b898408b64982ec45422034a4e11a3b846
                                      • Opcode Fuzzy Hash: e0fb295223f4e860c033cbc71566924fd772e91d6c138856920e52f9a2ab716f
                                      • Instruction Fuzzy Hash: DB1112B6D002099FDB10CFA9D544BEEFBF4AF88314F04842AD519A7700C375A945CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 147 2c895c8-2c89608 148 2c8960a-2c8960d 147->148 149 2c89610-2c8963b GetModuleHandleW 147->149 148->149 150 2c8963d-2c89643 149->150 151 2c89644-2c89658 149->151 150->151
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 02C8962E
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.561793604.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_2c80000_attached PI.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 501427cd2886931d88103d261e3482f632d63761e0f1fc80e725ecc9535a974c
                                      • Instruction ID: 48afd476705cc6683176da43038e13b2fc9ce5fcaa8dc210bbd5ec772860c91d
                                      • Opcode Fuzzy Hash: 501427cd2886931d88103d261e3482f632d63761e0f1fc80e725ecc9535a974c
                                      • Instruction Fuzzy Hash: 471110B5D002498FCB10DF9AD444BDFFBF4AF88228F14841AD819A7300C375A545CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 153 2c8da3c-2c8feaa SetWindowLongW 155 2c8feac-2c8feb2 153->155 156 2c8feb3-2c8fec7 153->156 155->156
                                      APIs
                                      • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,02C8FE28,?,?,?,?), ref: 02C8FE9D
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.561793604.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_2c80000_attached PI.jbxd
                                      Similarity
                                      • API ID: LongWindow
                                      • String ID:
                                      • API String ID: 1378638983-0
                                      • Opcode ID: 17ef78508e2dbbaf7ec87ef330d2506dd85fdefc02d0176a2f8c0e983641a38a
                                      • Instruction ID: b7137ba02796e3133e58edc7c428719bd4f7c36b13c81dd9a0503490e7c4c9cc
                                      • Opcode Fuzzy Hash: 17ef78508e2dbbaf7ec87ef330d2506dd85fdefc02d0176a2f8c0e983641a38a
                                      • Instruction Fuzzy Hash: 821133B59002489FDB10DF8AD584BDFBBF8EB88324F10845AE959A3700C374A940CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 158 2c8fe38-2c8feaa SetWindowLongW 159 2c8feac-2c8feb2 158->159 160 2c8feb3-2c8fec7 158->160 159->160
                                      APIs
                                      • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,02C8FE28,?,?,?,?), ref: 02C8FE9D
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.561793604.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_2c80000_attached PI.jbxd
                                      Similarity
                                      • API ID: LongWindow
                                      • String ID:
                                      • API String ID: 1378638983-0
                                      • Opcode ID: b8d0480a281ca4ae9b371b7a797f74bcd4e35d72c5159513cce3d756069fd1f7
                                      • Instruction ID: 29559b77a1e1445b1bc0fd2e4e7419d51ff34476ffc66bc96c6772aadb47d2df
                                      • Opcode Fuzzy Hash: b8d0480a281ca4ae9b371b7a797f74bcd4e35d72c5159513cce3d756069fd1f7
                                      • Instruction Fuzzy Hash: B71122B5900209CFDB10DF99D684BDEBBF8EB48328F14840AE998B3640C375A940CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.560614194.000000000141D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0141D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_141d000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0e168630f1df898527abad74c3ef50a13b5e7ecfa417158f8194490a25825b36
                                      • Instruction ID: fcc45cb1e790d0b1f21ebd94e4aa334fe592cc8c69b1fe2986b3b074abdb639a
                                      • Opcode Fuzzy Hash: 0e168630f1df898527abad74c3ef50a13b5e7ecfa417158f8194490a25825b36
                                      • Instruction Fuzzy Hash: 2F21D6B1944240DFDB05DF54D9C8B27BF65FB88328F24C56AE9094B22BC336D856C7A2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.560614194.000000000141D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0141D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_141d000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 88734d0333dc3d84fc302eb44851bda6af861a8071d21d2e5a13421e7f4cbe7e
                                      • Instruction ID: 880400cecc449dd7bf752f7959e7d1563e4bf6e6f89e75002cd216c84a15b8a2
                                      • Opcode Fuzzy Hash: 88734d0333dc3d84fc302eb44851bda6af861a8071d21d2e5a13421e7f4cbe7e
                                      • Instruction Fuzzy Hash: BE2136B1944240DFDB01CF54D9C8B67BB61FB88324F24C57AE9094B21BC336E856C6A1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.560727725.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_142d000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 82b5e4b6c3774f4afdaf87439f416db74058e3489efbd68a7a5913cde9c39ac7
                                      • Instruction ID: 36274184865cdcb1b98270ca00b44968137b22ffb1fd845505256d54235accba
                                      • Opcode Fuzzy Hash: 82b5e4b6c3774f4afdaf87439f416db74058e3489efbd68a7a5913cde9c39ac7
                                      • Instruction Fuzzy Hash: F02167B0A04240DFDB10CF54D8C0B26BB61FB88358F64C56AD90A4B367C33AD887CA61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.560727725.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_142d000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e8f676c992b144cf775f9e4d55149787b5f08bf569386c91a40d545d2690f1b2
                                      • Instruction ID: 1a78e25d71353b2ae6bdb3213e03e7d23b1bab2a06f3598cafe4d3f3e930a67a
                                      • Opcode Fuzzy Hash: e8f676c992b144cf775f9e4d55149787b5f08bf569386c91a40d545d2690f1b2
                                      • Instruction Fuzzy Hash: BD2192755093808FDB13CF24D994B16BF71EF46214F28C5DBD8498B667C33A984ACB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.560614194.000000000141D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0141D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_141d000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1f7ac2f4481a1f3a02653cb926aa5f3ae966e0cf86c06822d5ce43077063c11a
                                      • Instruction ID: a5a0b24d9ad16ec492d252d8efc4b3129952d80abbeaab9cb809751c7a3796ba
                                      • Opcode Fuzzy Hash: 1f7ac2f4481a1f3a02653cb926aa5f3ae966e0cf86c06822d5ce43077063c11a
                                      • Instruction Fuzzy Hash: 0311AFB6804280CFDB12CF54D9C4B16BF71FB84324F24C6AAD9050B62BC336D456CBA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.560614194.000000000141D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0141D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_141d000_attached PI.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1f7ac2f4481a1f3a02653cb926aa5f3ae966e0cf86c06822d5ce43077063c11a
                                      • Instruction ID: 0c5fb55318068a00df05ac386e08651c5bf1b230d088de64247d2b484e199972
                                      • Opcode Fuzzy Hash: 1f7ac2f4481a1f3a02653cb926aa5f3ae966e0cf86c06822d5ce43077063c11a
                                      • Instruction Fuzzy Hash: 4D11AFB6844280CFDB16CF54D9C4B56BF71FB84324F24C6AAD8450B62AC336E456CBA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%