Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe

Overview

General Information

Sample Name:APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Analysis ID:714049
MD5:c5ca6bf1a4d668abae8a1bd58da7fa89
SHA1:1fb0c57d1ea566b703be21a5dd2334166f5a918e
SHA256:f360431bc55ce6bbbd77f26a9bcb86b6267c3b82220d06ee4c67b44be2273735
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large strings
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Creates processes with suspicious names
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe (PID: 3256 cmdline: "C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe" MD5: C5CA6BF1A4D668ABAE8A1BD58DA7FA89)
    • schtasks.exe (PID: 1592 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp8832.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe (PID: 4128 cmdline: {path} MD5: C5CA6BF1A4D668ABAE8A1BD58DA7FA89)
      • schtasks.exe (PID: 5176 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp690.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 2264 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA4B.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe (PID: 3260 cmdline: "C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe" 0 MD5: C5CA6BF1A4D668ABAE8A1BD58DA7FA89)
    • schtasks.exe (PID: 3736 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2889.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 1680 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: C5CA6BF1A4D668ABAE8A1BD58DA7FA89)
    • schtasks.exe (PID: 920 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2B48.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 1276 cmdline: {path} MD5: C5CA6BF1A4D668ABAE8A1BD58DA7FA89)
  • dhcpmon.exe (PID: 2068 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: C5CA6BF1A4D668ABAE8A1BD58DA7FA89)
    • schtasks.exe (PID: 5716 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp63CD.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 2760 cmdline: {path} MD5: C5CA6BF1A4D668ABAE8A1BD58DA7FA89)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "bcd7727e-ef56-4958-8ed9-949f5c5e", "Group": "Default", "Domain1": "godisgood1.hopto.org", "Domain2": "185.225.73.164", "Port": 7712, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x1f1db:$x1: NanoCore.ClientPluginHost
  • 0x1f1f5:$x2: IClientNetworkHost
00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x1f1db:$x2: NanoCore.ClientPluginHost
  • 0x22518:$s4: PipeCreated
  • 0x1f1c8:$s5: IClientLoggingHost
00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x1f1b2:$x2: NanoCore.ClientPlugin
  • 0x1f1db:$x3: NanoCore.ClientPluginHost
  • 0x1f1a3:$i3: IClientNetwork
  • 0x1f1c8:$i6: IClientLoggingHost
  • 0x1f1f5:$i7: IClientNetworkHost
  • 0x1f208:$i8: IClientUIHost
  • 0x1ef12:$s1: ClientPlugin
  • 0x1f1bb:$s1: ClientPlugin
00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x1f1db:$a1: NanoCore.ClientPluginHost
  • 0x1f1b2:$a2: NanoCore.ClientPlugin
  • 0x24206:$b7: LogClientException
  • 0x1f1c8:$b9: IClientLoggingHost
00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x350b:$x1: NanoCore.ClientPluginHost
  • 0x3525:$x2: IClientNetworkHost
Click to see the 107 entries
SourceRuleDescriptionAuthorStrings
3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x3f0b:$x1: NanoCore.ClientPluginHost
  • 0x921c:$x1: NanoCore.ClientPluginHost
  • 0x3f44:$x2: IClientNetworkHost
3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x3f0b:$x2: NanoCore.ClientPluginHost
  • 0x921c:$x2: NanoCore.ClientPluginHost
  • 0x400f:$s4: PipeCreated
  • 0x92fa:$s4: PipeCreated
  • 0x3f25:$s5: IClientLoggingHost
  • 0x9236:$s5: IClientLoggingHost
3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x3f87:$x2: NanoCore.ClientPlugin
  • 0x9266:$x2: NanoCore.ClientPlugin
  • 0x3f0b:$x3: NanoCore.ClientPluginHost
  • 0x921c:$x3: NanoCore.ClientPluginHost
  • 0x3f9d:$i3: IClientNetwork
  • 0x927c:$i3: IClientNetwork
  • 0x3f25:$i6: IClientLoggingHost
  • 0x9236:$i6: IClientLoggingHost
  • 0x3f44:$i7: IClientNetworkHost
  • 0x3bfb:$s1: ClientPlugin
  • 0x3f90:$s1: ClientPlugin
  • 0x8ff9:$s1: ClientPlugin
  • 0x926f:$s1: ClientPlugin
  • 0x50f4:$s3: IPAddress
3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x3f0b:$a1: NanoCore.ClientPluginHost
  • 0x921c:$a1: NanoCore.ClientPluginHost
  • 0x3f87:$a2: NanoCore.ClientPlugin
  • 0x9266:$a2: NanoCore.ClientPlugin
  • 0x4b10:$b7: LogClientException
  • 0x3f25:$b9: IClientLoggingHost
  • 0x9236:$b9: IClientLoggingHost
17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2eb9838.0.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xe75:$x1: NanoCore.ClientPluginHost
  • 0xe8f:$x2: IClientNetworkHost
Click to see the 267 entries

AV Detection

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, ProcessId: 4128, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

E-Banking Fraud

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, ProcessId: 4128, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Persistence and Installation Behavior

barindex
Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp8832.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp8832.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe" , ParentImage: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, ParentProcessId: 3256, ParentProcessName: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp8832.tmp, ProcessId: 1592, ProcessName: schtasks.exe

Stealing of Sensitive Information

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, ProcessId: 4128, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Remote Access Functionality

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, ProcessId: 4128, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
Timestamp:37.139.129.71192.168.2.47712496982841753 10/01/22-12:42:35.121312
SID:2841753
Source Port:7712
Destination Port:49698
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.437.139.129.714969877122025019 10/01/22-12:42:30.424505
SID:2025019
Source Port:49698
Destination Port:7712
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.437.139.129.714969877122816766 10/01/22-12:42:35.951752
SID:2816766
Source Port:49698
Destination Port:7712
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeReversingLabs: Detection: 34%
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeVirustotal: Detection: 30%Perma Link
Source: godisgood1.hopto.orgAvira URL Cloud: Label: malware
Source: 185.225.73.164Avira URL Cloud: Label: malware
Source: godisgood1.hopto.orgVirustotal: Detection: 13%Perma Link
Source: godisgood1.hopto.orgVirustotal: Detection: 13%Perma Link
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 36%
Source: C:\Users\user\AppData\Roaming\JLsbuY.exeReversingLabs: Detection: 36%
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 5000, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1276, type: MEMORYSTR
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\JLsbuY.exeJoe Sandbox ML: detected
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpackAvira: Label: TR/NanoCore.fadte
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "bcd7727e-ef56-4958-8ed9-949f5c5e", "Group": "Default", "Domain1": "godisgood1.hopto.org", "Domain2": "185.225.73.164", "Port": 7712, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]

Networking

barindex
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49698 -> 37.139.129.71:7712
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49698 -> 37.139.129.71:7712
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 37.139.129.71:7712 -> 192.168.2.4:49698
Source: Malware configuration extractorURLs: godisgood1.hopto.org
Source: Malware configuration extractorURLs: 185.225.73.164
Source: Joe Sandbox ViewASN Name: LVLT-10753US LVLT-10753US
Source: Joe Sandbox ViewIP Address: 37.139.129.71 37.139.129.71
Source: global trafficTCP traffic: 192.168.2.4:49698 -> 37.139.129.71:7712
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303119536.0000000000BCD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.w
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://google.com
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.346550034.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000006.00000002.453978396.00000000031B5000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000A.00000002.480986509.0000000002974000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.317352691.0000000005522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agfamonotype.
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.317352691.0000000005522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agfamonotype.~SBIm
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.312451749.000000000554D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.312292131.000000000551A000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311387611.0000000005518000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFV
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcom
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomFH
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdd
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.344604107.0000000005510000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.365697319.000000000551A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comepkoH
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.312292131.000000000551A000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessed
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.344604107.0000000005510000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.365697319.000000000551A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comiona
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comituF
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.344604107.0000000005510000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.365697319.000000000551A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comm
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303685970.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303762586.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303640331.0000000005532000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303671777.000000000552B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303685970.0000000005534000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comS
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303685970.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303640331.0000000005532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comibi
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303762586.000000000552B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comic
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303629841.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303671777.000000000552B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comical
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307239153.0000000005514000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.c
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307654597.000000000551B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307572542.0000000005519000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307239153.0000000005514000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn#H4
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307564401.0000000005514000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/om
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnT
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnoH%
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnr-f
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnsH
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303377395.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303559071.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303715113.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303685970.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303820040.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303588332.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303452217.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303515704.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303774139.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303418482.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303640331.0000000005532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303377395.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303559071.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303820040.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303774139.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303418482.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303640331.0000000005532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comn-u
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.306187785.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krXH.
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.306187785.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krend
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.304289380.000000000552B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comc
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.304268623.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.304289380.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.304202190.000000000552B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comn
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deJ(
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.derT
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
Source: unknownDNS traffic detected: queries for: godisgood1.hopto.org
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.345324035.000000000092B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

E-Banking Fraud

barindex
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 5000, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1276, type: MEMORYSTR

System Summary

barindex
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2eb9838.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2eb9838.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2eb9838.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 18.2.dhcpmon.exe.32d9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.dhcpmon.exe.32d9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 18.2.dhcpmon.exe.32d9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39ce5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39ce5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39ce5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5050000.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5050000.16.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5050000.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6fe0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6fe0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6fe0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6540000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6540000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6540000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.29fbfc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.29fbfc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.29fbfc4.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.29fbfc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39d81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39d81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39d81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a68378.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a68378.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a68378.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a68378.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000003.376885871.0000000006301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.580783944.00000000039C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 5000, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 5000, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: dhcpmon.exe PID: 1276, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: dhcpmon.exe PID: 1276, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, MRU.csLong String: Length: 129663
Source: JLsbuY.exe.0.dr, MRU.csLong String: Length: 129663
Source: 0.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.110000.0.unpack, MRU.csLong String: Length: 129663
Source: dhcpmon.exe.3.dr, MRU.csLong String: Length: 129663
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2eb9838.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2eb9838.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2eb9838.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2eb9838.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 18.2.dhcpmon.exe.32d9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.dhcpmon.exe.32d9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.dhcpmon.exe.32d9658.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 18.2.dhcpmon.exe.32d9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39ce5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39ce5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39ce5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39ce5cf.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7010000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d0a1ff.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5050000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5050000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5050000.16.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5050000.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6fe0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6fe0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6fe0000.24.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6fe0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cc0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d0000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6540000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6540000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6540000.22.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6540000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5cd0000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72c0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.29fbfc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.29fbfc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.29fbfc4.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.29fbfc4.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.29fbfc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d1302e.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72a0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6ff0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.6e80000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72d4c9f.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3d2145e.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a18f30.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7310000.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.72de8a4.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a0cc80.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39c9930.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.7000000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39d81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39d81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39d81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.39d81d4.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a79658.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a6dde4.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a68378.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a68378.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a68378.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a68378.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.2a68378.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000003.376885871.0000000006301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.580783944.00000000039C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3260, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: dhcpmon.exe PID: 1680, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: dhcpmon.exe PID: 2068, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 5000, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 5000, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: dhcpmon.exe PID: 1276, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: dhcpmon.exe PID: 1276, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 0_2_0248E710
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 0_2_0248E720
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 0_2_0248C414
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 0_2_06CEE6B0
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_04E0E480
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_04E0E471
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_04E0BBD4
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_04F5F5F8
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_04F59788
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_04F5A610
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_06579238
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_06570040
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_06577F78
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_06578CB0
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_065792F6
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000000.299314738.0000000000234000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamenRlQOE1.exe. vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.345324035.000000000092B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.380264249.0000000006DF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameQuestKingdom.dllH vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.380457215.0000000006FE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.346938414.00000000024F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQuestKingdom.dllH vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenRlQOE1.exe. vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.595033114.000000000731E000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000003.376885871.0000000006301000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.591435010.00000000060B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581179879.0000000003A41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594823559.00000000072F8000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594532217.00000000072C8000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.580783944.00000000039C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.580783944.00000000039C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.580783944.00000000039C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000006.00000002.457454682.00000000043BA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQuestKingdom.dllH vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000006.00000002.441282649.00000000015EA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeBinary or memory string: OriginalFilenamenRlQOE1.exe. vs APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeReversingLabs: Detection: 34%
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeVirustotal: Detection: 30%
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile read: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeJump to behavior
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknownProcess created: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe "C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe"
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp8832.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe {path}
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp690.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe "C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe" 0
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA4B.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2889.tmp
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2B48.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe {path}
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp63CD.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp8832.tmp
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe {path}
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp690.tmp
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA4B.tmp
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2889.tmp
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe {path}
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2B48.tmp
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp63CD.tmp
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: C:\Users\user\AppData\Roaming\JLsbuY.exeJump to behavior
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: C:\Users\user\AppData\Local\Temp\tmp8832.tmpJump to behavior
Source: classification engineClassification label: mal100.troj.evad.winEXE@30/15@3/1
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2220:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5000:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2188:120:WilError_01
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{bcd7727e-ef56-4958-8ed9-949f5c5ea8f6}
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4616:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6052:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4748:120:WilError_01
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic file information: File size 1189376 > 1048576
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x121000
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 0_2_04AD8DEC push E801005Eh; retf
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 0_2_04ADB200 pushfd ; retf
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 0_2_04AD1FE7 push eax; mov dword ptr [esp], ecx
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 0_2_04AD1FF8 push eax; mov dword ptr [esp], ecx
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_04F569F8 pushad ; retf
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_04F569FA push esp; retf
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_0657A3F0 push ds; iretd
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_0657BE00 push es; retf
Source: initial sampleStatic PE information: section name: .text entropy: 6.951369793482402
Source: initial sampleStatic PE information: section name: .text entropy: 6.951369793482402
Source: initial sampleStatic PE information: section name: .text entropy: 6.951369793482402
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exe
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exe
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exe
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exe
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exe
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exe
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exe
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exe
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exe
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exe
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exe
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: \application form master sdpo brilinskiy new u.exe
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: C:\Users\user\AppData\Roaming\JLsbuY.exeJump to dropped file
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp8832.tmp

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeFile opened: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe:Zone.Identifier read attributes | delete
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3260, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1680, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2068, type: MEMORYSTR
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.346550034.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000006.00000002.453978396.00000000031B5000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.346550034.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000006.00000002.453978396.00000000031B5000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe TID: 3996Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe TID: 6048Thread sleep time: -6456360425798339s >= -30000s
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe TID: 972Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5276Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1968Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe TID: 6052Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5348Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5336Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeWindow / User API: threadDelayed 9216
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeWindow / User API: foregroundWindowGot 440
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeWindow / User API: foregroundWindowGot 384
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess information queried: ProcessInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000006.00000002.468982131.0000000007333000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:
Source: dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
Source: dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
Source: dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
Source: dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
Source: dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: dhcpmon.exe, 00000009.00000002.445842687.00000000012CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:m
Source: dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
Source: dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
Source: dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeCode function: 3_2_065739C0 LdrInitializeThunk,
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeMemory allocated: page read and write | page guard

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeMemory written: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeMemory written: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe base: 400000 value starts with: 4D5A
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp8832.tmp
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe {path}
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp690.tmp
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA4B.tmp
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2889.tmp
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeProcess created: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe {path}
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2B48.tmp
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp63CD.tmp
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.578822012.0000000002D20000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.580163177.0000000002DE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerD$
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.595087597.000000000768E000.00000004.00000010.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.592546991.000000000653D000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.595175494.000000000798E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager0
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593174195.0000000006A7E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager X
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

Stealing of Sensitive Information

barindex
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 5000, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1276, type: MEMORYSTR

Remote Access Functionality

barindex
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000003.376885871.0000000006301000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.580783944.00000000039C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: dhcpmon.exe, 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3561550.0.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5284629.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3e9b7de.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea4c3d.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 17.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3ea0614.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b3f601.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.36d0a00.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b5fe62.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.3b4b835.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 3256, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 4128, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe PID: 5000, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1276, type: MEMORYSTR
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Scheduled Task/Job
1
Scheduled Task/Job
112
Process Injection
2
Masquerading
21
Input Capture
21
Security Software Discovery
Remote Services21
Input Capture
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Scheduled Task/Job
1
Disable or Modify Tools
LSASS Memory2
Process Discovery
Remote Desktop Protocol11
Archive Collected Data
Exfiltration Over Bluetooth1
Non-Standard Port
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
Virtualization/Sandbox Evasion
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Remote Access Software
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer1
Non-Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets1
File and Directory Discovery
SSHKeyloggingData Transfer Size Limits11
Application Layer Protocol
Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
Hidden Files and Directories
Cached Domain Credentials12
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup Items3
Obfuscated Files or Information
DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job12
Software Packing
Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 714049 Sample: APPLICATION FORM MASTER SDP... Startdate: 01/10/2022 Architecture: WINDOWS Score: 100 67 Snort IDS alert for network traffic 2->67 69 Multi AV Scanner detection for domain / URL 2->69 71 Malicious sample detected (through community Yara rule) 2->71 73 15 other signatures 2->73 8 APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe 6 2->8         started        12 APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe 4 2->12         started        14 dhcpmon.exe 5 2->14         started        16 dhcpmon.exe 2->16         started        process3 file4 59 C:\Users\user\AppData\Roaming\JLsbuY.exe, PE32 8->59 dropped 61 C:\Users\user\AppData\Local\...\tmp8832.tmp, XML 8->61 dropped 63 APPLICATION FORM M...nskiy NEW U.exe.log, ASCII 8->63 dropped 77 Injects a PE file into a foreign processes 8->77 18 APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe 1 14 8->18         started        23 schtasks.exe 1 8->23         started        25 schtasks.exe 12->25         started        27 APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe 12->27         started        29 schtasks.exe 14->29         started        31 dhcpmon.exe 14->31         started        33 schtasks.exe 16->33         started        35 dhcpmon.exe 16->35         started        signatures5 process6 dnsIp7 65 godisgood1.hopto.org 37.139.129.71, 49698, 7712 LVLT-10753US Germany 18->65 53 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->53 dropped 55 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 18->55 dropped 57 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 18->57 dropped 75 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->75 37 schtasks.exe 1 18->37         started        39 schtasks.exe 1 18->39         started        41 conhost.exe 23->41         started        43 conhost.exe 25->43         started        45 conhost.exe 29->45         started        47 conhost.exe 33->47         started        file8 signatures9 process10 process11 49 conhost.exe 37->49         started        51 conhost.exe 39->51         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe34%ReversingLabsByteCode-MSIL.Trojan.Woreflint
APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe31%VirustotalBrowse
APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\JLsbuY.exe100%Joe Sandbox ML
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe37%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
C:\Users\user\AppData\Roaming\JLsbuY.exe37%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
SourceDetectionScannerLabelLinkDownload
3.2.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.5280000.17.unpack100%AviraTR/NanoCore.fadteDownload File
3.0.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
SourceDetectionScannerLabelLink
godisgood1.hopto.org14%VirustotalBrowse
SourceDetectionScannerLabelLink
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.sajatypeworks.comn-u0%URL Reputationsafe
http://www.founder.com.cn/cnT0%URL Reputationsafe
http://www.tiro.com0%URL Reputationsafe
http://www.fontbureau.comessed0%URL Reputationsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.fontbureau.comiona0%URL Reputationsafe
http://www.fontbureau.comiona0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://www.fonts.comic0%URL Reputationsafe
http://www.fontbureau.comcom0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.urwpp.de0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe
http://www.founder.com.cn/cnr-f0%URL Reputationsafe
http://www.fontbureau.comF0%URL Reputationsafe
http://www.agfamonotype.0%URL Reputationsafe
http://www.founder.com.c0%URL Reputationsafe
http://www.tiro.comn0%URL Reputationsafe
http://www.fontbureau.comd0%URL Reputationsafe
http://en.w0%URL Reputationsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.fontbureau.comituF0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.fontbureau.comm0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.tiro.comc0%URL Reputationsafe
godisgood1.hopto.org14%VirustotalBrowse
http://www.fontbureau.comFV0%Avira URL Cloudsafe
http://www.fonts.comibi0%Avira URL Cloudsafe
http://www.fontbureau.comepkoH0%Avira URL Cloudsafe
godisgood1.hopto.org100%Avira URL Cloudmalware
http://www.founder.com.cn/cnsH0%Avira URL Cloudsafe
http://www.agfamonotype.~SBIm0%Avira URL Cloudsafe
http://www.founder.com.cn/cn#H40%Avira URL Cloudsafe
http://www.fontbureau.comcomFH0%Avira URL Cloudsafe
http://www.fontbureau.comdd0%Avira URL Cloudsafe
http://www.founder.com.cn/cn/om0%Avira URL Cloudsafe
http://www.fonts.comS0%Avira URL Cloudsafe
185.225.73.164100%Avira URL Cloudmalware
http://www.urwpp.derT0%Avira URL Cloudsafe
http://www.urwpp.deJ(0%Avira URL Cloudsafe
http://www.fonts.comical0%Avira URL Cloudsafe
http://www.sandoll.co.krXH.0%Avira URL Cloudsafe
http://www.sandoll.co.krend0%Avira URL Cloudsafe
http://www.founder.com.cn/cnoH%0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
godisgood1.hopto.org
37.139.129.71
truetrueunknown
NameMaliciousAntivirus DetectionReputation
godisgood1.hopto.orgtrue
  • 14%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
185.225.73.164true
  • Avira URL Cloud: malware
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://www.fontbureau.com/designersGAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    http://www.fontbureau.comFVAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://www.fontbureau.com/designers/?APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.founder.com.cn/cn/bTheAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.founder.com.cn/cnsHAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.fontbureau.com/designers?APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.sajatypeworks.comn-uAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303377395.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303559071.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303820040.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303774139.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303418482.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303640331.0000000005532000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.founder.com.cn/cnTAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.tiro.comAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.fontbureau.com/designersAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.fontbureau.comessedAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.312292131.000000000551A000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.goodfont.co.krAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://google.comAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmpfalse
            high
            http://www.fontbureau.comepkoHAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.344604107.0000000005510000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.365697319.000000000551A000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.comionaAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.344604107.0000000005510000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.365697319.000000000551A000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.sajatypeworks.comAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303377395.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303559071.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303715113.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303685970.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303820040.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303588332.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303452217.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303515704.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303774139.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303418482.0000000005533000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303640331.0000000005532000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.typography.netDAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cn/cTheAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.galapagosdesign.com/staff/dennis.htmAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://fontfabrik.comAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.fonts.comicAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303762586.000000000552B000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fonts.comibiAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303685970.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303640331.0000000005532000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.comcomAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.galapagosdesign.com/DPleaseAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.agfamonotype.~SBImAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.317352691.0000000005522000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            low
            http://www.fonts.comAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303685970.0000000005534000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303762586.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303640331.0000000005532000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303671777.000000000552B000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.sandoll.co.krAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.urwpp.deDPleaseAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.urwpp.deAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.zhongyicts.com.cnAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.346550034.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000006.00000002.453978396.00000000031B5000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000009.00000002.455600928.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000A.00000002.480986509.0000000002974000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.sakkal.comAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cn#H4APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.founder.com.cn/cn/omAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307564401.0000000005514000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.founder.com.cn/cnr-fAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.apache.org/licenses/LICENSE-2.0APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.comAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.comFAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.312292131.000000000551A000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311387611.0000000005518000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.agfamonotype.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.317352691.0000000005522000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307239153.0000000005514000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.tiro.comnAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.304268623.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.304289380.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.304202190.000000000552B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.comddAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.comcomFHAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fonts.comSAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303685970.0000000005534000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.comdAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.311980649.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://en.wAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303119536.0000000000BCD000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.comlAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.urwpp.derTAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers/cabarga.htmlNAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.comituFAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cnAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307654597.000000000551B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307572542.0000000005519000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307239153.0000000005514000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.urwpp.deJ(APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.313059366.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.fontbureau.com/designers/frere-user.htmlAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fonts.comicalAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303629841.000000000552B000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.303671777.000000000552B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.312451749.000000000554D000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.sandoll.co.krXH.APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.306187785.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.commAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.344604107.0000000005510000.00000004.00000800.00020000.00000000.sdmp, APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.365697319.000000000551A000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers8APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000002.367334351.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.sandoll.co.krendAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.306187785.0000000005519000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.tiro.comcAPPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.304289380.000000000552B000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cnoH%APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe, 00000000.00000003.307170791.000000000554D000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            37.139.129.71
                            godisgood1.hopto.orgGermany
                            10753LVLT-10753UStrue
                            Joe Sandbox Version:36.0.0 Rainbow Opal
                            Analysis ID:714049
                            Start date and time:2022-10-01 12:41:07 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 10m 54s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Sample file name:APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:25
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.troj.evad.winEXE@30/15@3/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HDC Information:Failed
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
                            • TCP Packets have been reduced to 100
                            • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report creation exceeded maximum time and may have missing disassembly code information.
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            12:42:11API Interceptor724x Sleep call for process: APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe modified
                            12:42:23Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe" s>$(Arg0)
                            12:42:24AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            12:42:26Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                            12:42:54API Interceptor2x Sleep call for process: dhcpmon.exe modified
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):1189376
                            Entropy (8bit):6.94809823392214
                            Encrypted:false
                            SSDEEP:24576:LrArSrrSV1DCOzMFd1bFfxR6ImZlNRU3jrx:OV/+9fxAXU
                            MD5:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                            SHA1:1FB0C57D1EA566B703BE21A5DD2334166F5A918E
                            SHA-256:F360431BC55CE6BBBD77F26A9BCB86B6267C3B82220D06EE4C67B44BE2273735
                            SHA-512:18401E658D3D97A845D8ED05A750EB702337D9C4E1D25CCEDC5A6024BEB09CC333668C6F16A60E11523E79908DCD5D7D439A396724B9D5329D44648F6996FDC7
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 37%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....7c..............P............../... ...@....@.. ....................................@.....................................O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`.......$..............@..B........................H........Q..dq......B........k............................................(....*&..(.....*.s ........s!........s"........s#........s$........*...0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*.0...........~....o(....+..*.0...........~....o)....+..*.0..<........~.....(*.....,!r...p.....(+...o,...s-............~.....+..*.0...........~.....+..*".......*.0..&........(....r#..p~....o....(/.....t$....+..*...0..&........(....r5..p~....o....(/.....
                            Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Preview:[ZoneTransfer]....ZoneId=0
                            Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.355304211458859
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                            MD5:69206D3AF7D6EFD08F4B4726998856D3
                            SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                            SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                            SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                            Malicious:true
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.355304211458859
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                            MD5:69206D3AF7D6EFD08F4B4726998856D3
                            SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                            SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                            SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                            Malicious:false
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                            Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1639
                            Entropy (8bit):5.179579532436944
                            Encrypted:false
                            SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGc6Ptn:cbhK79lNQR/rydbz9I3YODOLNdq3ho
                            MD5:434B39DEA1D167EF66A3D88C5E1B052F
                            SHA1:3850962A4E0064FC0568C51DFA5B7EA3A7859DDC
                            SHA-256:8263E5BEE3F8FC17EF42C4A860499EA8F05D83C17FE7F6099846085B49D85279
                            SHA-512:17429C9AAE656E636CD928FA5D4E5672C12458C740A292852E5D3F18AE4817ECFB85F9BA96376ED97455570EA22A0D2E02A846311D7E1D55D24E60A0D30F157B
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1639
                            Entropy (8bit):5.179579532436944
                            Encrypted:false
                            SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGc6Ptn:cbhK79lNQR/rydbz9I3YODOLNdq3ho
                            MD5:434B39DEA1D167EF66A3D88C5E1B052F
                            SHA1:3850962A4E0064FC0568C51DFA5B7EA3A7859DDC
                            SHA-256:8263E5BEE3F8FC17EF42C4A860499EA8F05D83C17FE7F6099846085B49D85279
                            SHA-512:17429C9AAE656E636CD928FA5D4E5672C12458C740A292852E5D3F18AE4817ECFB85F9BA96376ED97455570EA22A0D2E02A846311D7E1D55D24E60A0D30F157B
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1639
                            Entropy (8bit):5.179579532436944
                            Encrypted:false
                            SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGc6Ptn:cbhK79lNQR/rydbz9I3YODOLNdq3ho
                            MD5:434B39DEA1D167EF66A3D88C5E1B052F
                            SHA1:3850962A4E0064FC0568C51DFA5B7EA3A7859DDC
                            SHA-256:8263E5BEE3F8FC17EF42C4A860499EA8F05D83C17FE7F6099846085B49D85279
                            SHA-512:17429C9AAE656E636CD928FA5D4E5672C12458C740A292852E5D3F18AE4817ECFB85F9BA96376ED97455570EA22A0D2E02A846311D7E1D55D24E60A0D30F157B
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                            Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1335
                            Entropy (8bit):5.131538419856332
                            Encrypted:false
                            SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Y8dxtn:cbk4oL600QydbQxIYODOLedq3odj
                            MD5:B9DEE575F2B0ACDC2037D92C74DC29BB
                            SHA1:037CA9A5B3612ADEB251AE4D780CD0D0C5053DCB
                            SHA-256:8036080B940A7BD8C425649914CCBBA4A4DCF3AABA3023DFAD249BD89F36F4F7
                            SHA-512:3970ADE224745201DC6C3FB65E57083B136C53088B212FF1F801388876BB7A3B744B777A1138673BC294614244BA564F39499C865F437221293085BBA334C4C4
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                            Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1639
                            Entropy (8bit):5.179579532436944
                            Encrypted:false
                            SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGc6Ptn:cbhK79lNQR/rydbz9I3YODOLNdq3ho
                            MD5:434B39DEA1D167EF66A3D88C5E1B052F
                            SHA1:3850962A4E0064FC0568C51DFA5B7EA3A7859DDC
                            SHA-256:8263E5BEE3F8FC17EF42C4A860499EA8F05D83C17FE7F6099846085B49D85279
                            SHA-512:17429C9AAE656E636CD928FA5D4E5672C12458C740A292852E5D3F18AE4817ECFB85F9BA96376ED97455570EA22A0D2E02A846311D7E1D55D24E60A0D30F157B
                            Malicious:true
                            Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                            Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1310
                            Entropy (8bit):5.109425792877704
                            Encrypted:false
                            SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                            MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                            SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                            SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                            SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                            Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):232
                            Entropy (8bit):7.089541637477408
                            Encrypted:false
                            SSDEEP:3:XrURGizD7cnRNGbgCFKRNX/pBK0jCV83ne+VdWPiKgmR7kkmefoeLBizbCuVkqYM:X4LDAnybgCFcps0OafmCYDlizZr/i/Oh
                            MD5:9E7D0351E4DF94A9B0BADCEB6A9DB963
                            SHA1:76C6A69B1C31CEA2014D1FD1E222A3DD1E433005
                            SHA-256:AAFC7B40C5FE680A2BB549C3B90AABAAC63163F74FFFC0B00277C6BBFF88B757
                            SHA-512:93CCF7E046A3C403ECF8BC4F1A8850BA0180FE18926C98B297C5214EB77BC212C8FBCC58412D0307840CF2715B63BE68BACDA95AA98E82835C5C53F17EF38511
                            Malicious:false
                            Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&
                            Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            File Type:Non-ISO extended-ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):8
                            Entropy (8bit):3.0
                            Encrypted:false
                            SSDEEP:3:DCg:z
                            MD5:5A6FF3DF7B2CB03AA295AE6A3C2728C6
                            SHA1:656CE7D1794A14D6E749316CBD0BD00AA2DF9D8F
                            SHA-256:08F3C75923C4CC4BD40D01FB1D98198307914B0841B9CBD4008F21E4BE5323A2
                            SHA-512:D55DF6007CDE0465EB462FDE244FC7707D640179C42499CC20737402E2EE19D50CC12C875531977894F403478024E15EE086FA9ECBC5A827E9378BCC43C873EA
                            Malicious:true
                            Preview:.;g....H
                            Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            File Type:data
                            Category:modified
                            Size (bytes):327768
                            Entropy (8bit):7.999367066417797
                            Encrypted:true
                            SSDEEP:6144:oX44S90aTiB66x3PlZmqze1d1wI8lkWmtjJ/3Exi:LkjbU7LjGxi
                            MD5:2E52F446105FBF828E63CF808B721F9C
                            SHA1:5330E54F238F46DC04C1AC62B051DB4FCD7416FB
                            SHA-256:2F7479AA2661BD259747BC89106031C11B3A3F79F12190E7F19F5DF65B7C15C8
                            SHA-512:C08BA0E3315E2314ECBEF38722DF834C2CB8412446A9A310F41A8F83B4AC5984FCC1B26A1D8B0D58A730FDBDD885714854BDFD04DCDF7F582FC125F552D5C3CA
                            Malicious:false
                            Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                            Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):72
                            Entropy (8bit):4.867861029749889
                            Encrypted:false
                            SSDEEP:3:oNt+WfWk1Q9PFB8j+nXIMLWA2LN:oNwvk1QRsj+nXxix
                            MD5:2D2969AF6342D4C42632BBEA0FAAB3C1
                            SHA1:533268FF8603A9705BDB38DB60CB2D795E754A30
                            SHA-256:B2ACA0EE9C8564A59BF6F15F82FDD183486916F18F1E333243E285A8E9957F47
                            SHA-512:4C0B9ED26CBD070D9542F258957F4436F0CEECD032D3A8582708B97DF53AB536AD664195C1AAA5D24EDD983ABFA135AD90C0535C99EDFC174274F5569CFDDDE5
                            Malicious:false
                            Preview:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            Process:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):1189376
                            Entropy (8bit):6.94809823392214
                            Encrypted:false
                            SSDEEP:24576:LrArSrrSV1DCOzMFd1bFfxR6ImZlNRU3jrx:OV/+9fxAXU
                            MD5:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                            SHA1:1FB0C57D1EA566B703BE21A5DD2334166F5A918E
                            SHA-256:F360431BC55CE6BBBD77F26A9BCB86B6267C3B82220D06EE4C67B44BE2273735
                            SHA-512:18401E658D3D97A845D8ED05A750EB702337D9C4E1D25CCEDC5A6024BEB09CC333668C6F16A60E11523E79908DCD5D7D439A396724B9D5329D44648F6996FDC7
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 37%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....7c..............P............../... ...@....@.. ....................................@.....................................O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`.......$..............@..B........................H........Q..dq......B........k............................................(....*&..(.....*.s ........s!........s"........s#........s$........*...0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*.0...........~....o(....+..*.0...........~....o)....+..*.0..<........~.....(*.....,!r...p.....(+...o,...s-............~.....+..*.0...........~.....+..*".......*.0..&........(....r#..p~....o....(/.....t$....+..*...0..&........(....r5..p~....o....(/.....
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):6.94809823392214
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                            • Win32 Executable (generic) a (10002005/4) 49.78%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            • DOS Executable Generic (2002/1) 0.01%
                            File name:APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            File size:1189376
                            MD5:c5ca6bf1a4d668abae8a1bd58da7fa89
                            SHA1:1fb0c57d1ea566b703be21a5dd2334166f5a918e
                            SHA256:f360431bc55ce6bbbd77f26a9bcb86b6267c3b82220d06ee4c67b44be2273735
                            SHA512:18401e658d3d97a845d8ed05a750eb702337d9c4e1d25ccedc5a6024beb09cc333668c6f16a60e11523e79908dcd5d7d439a396724b9d5329d44648f6996fdc7
                            SSDEEP:24576:LrArSrrSV1DCOzMFd1bFfxR6ImZlNRU3jrx:OV/+9fxAXU
                            TLSH:AA453A1425DA4B1EF07E8BF91BD4A4E54BFAE622A329E5FA3DE043850722F01CDC1576
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....7c..............P............../... ...@....@.. ....................................@................................
                            Icon Hash:00828e8e8686b000
                            Entrypoint:0x522f16
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x6337A6B5 [Sat Oct 1 02:32:21 2022 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x122ec40x4f.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1240000x11c8.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1260000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000x120f1c0x121000False0.6100981293252595data6.951369793482402IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0x1240000x11c80x1200False0.3919270833333333data5.051703971077691IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x1260000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountry
                            RT_VERSION0x1240900x30cdata
                            RT_MANIFEST0x1243ac0xe15XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF, LF line terminators
                            DLLImport
                            mscoree.dll_CorExeMain
                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                            37.139.129.71192.168.2.47712496982841753 10/01/22-12:42:35.121312TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)77124969837.139.129.71192.168.2.4
                            192.168.2.437.139.129.714969877122025019 10/01/22-12:42:30.424505TCP2025019ET TROJAN Possible NanoCore C2 60B496987712192.168.2.437.139.129.71
                            192.168.2.437.139.129.714969877122816766 10/01/22-12:42:35.951752TCP2816766ETPRO TROJAN NanoCore RAT CnC 7496987712192.168.2.437.139.129.71
                            TimestampSource PortDest PortSource IPDest IP
                            Oct 1, 2022 12:42:30.048540115 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:30.076286077 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:30.076489925 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:30.424504995 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:30.472449064 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:30.546344995 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:30.588115931 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:30.755649090 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:30.817027092 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:30.916877985 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:30.944308996 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:30.950195074 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:30.950231075 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:30.950248957 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:30.950268984 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:30.950289011 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:30.950340033 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:30.979064941 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:30.979098082 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:30.979115009 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:30.979135990 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:30.979155064 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:30.979173899 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:30.979190111 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:30.979191065 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:30.979211092 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:30.979238033 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:30.979262114 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.006762028 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.006822109 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.006844997 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.006867886 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.006910086 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.006932974 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.006952047 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.006956100 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.006979942 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.007011890 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.007013083 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.007030964 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.007036924 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.007062912 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.007081032 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.007086992 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.007117033 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.007127047 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.007141113 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.007163048 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.007180929 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.034719944 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.034754038 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.034774065 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.034780979 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.034794092 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.034815073 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.034821987 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.034836054 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.034854889 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.034854889 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.034888029 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.034893036 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.034914017 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.034933090 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.034945011 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.034950972 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.034970045 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.034981012 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.034990072 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.035008907 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.035027027 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.035031080 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.035058022 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.035059929 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.035080910 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.035098076 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.035113096 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.035115957 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.035135984 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.035150051 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.035155058 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.035173893 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.035188913 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.035192966 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.035211086 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.035223007 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.035229921 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.035248995 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.035268068 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.035273075 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.035300016 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.063040972 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.063081980 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.063107967 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.063133001 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.063141108 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.063160896 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.063178062 CEST496987712192.168.2.437.139.129.71
                            Oct 1, 2022 12:42:31.063193083 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.063220024 CEST77124969837.139.129.71192.168.2.4
                            Oct 1, 2022 12:42:31.063230038 CEST496987712192.168.2.437.139.129.71
                            TimestampSource PortDest PortSource IPDest IP
                            Oct 1, 2022 12:42:30.000255108 CEST5657253192.168.2.48.8.8.8
                            Oct 1, 2022 12:42:30.021872997 CEST53565728.8.8.8192.168.2.4
                            Oct 1, 2022 12:42:43.918507099 CEST5091153192.168.2.48.8.8.8
                            Oct 1, 2022 12:42:43.938385010 CEST53509118.8.8.8192.168.2.4
                            Oct 1, 2022 12:42:47.465024948 CEST5968353192.168.2.48.8.8.8
                            Oct 1, 2022 12:42:47.486771107 CEST53596838.8.8.8192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Oct 1, 2022 12:42:30.000255108 CEST192.168.2.48.8.8.80xa928Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)false
                            Oct 1, 2022 12:42:43.918507099 CEST192.168.2.48.8.8.80xa723Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)false
                            Oct 1, 2022 12:42:47.465024948 CEST192.168.2.48.8.8.80x2be2Standard query (0)godisgood1.hopto.orgA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Oct 1, 2022 12:42:30.021872997 CEST8.8.8.8192.168.2.40xa928No error (0)godisgood1.hopto.org37.139.129.71A (IP address)IN (0x0001)false
                            Oct 1, 2022 12:42:43.938385010 CEST8.8.8.8192.168.2.40xa723No error (0)godisgood1.hopto.org37.139.129.71A (IP address)IN (0x0001)false
                            Oct 1, 2022 12:42:47.486771107 CEST8.8.8.8192.168.2.40x2be2No error (0)godisgood1.hopto.org37.139.129.71A (IP address)IN (0x0001)false

                            Click to jump to process

                            Target ID:0
                            Start time:12:41:58
                            Start date:01/10/2022
                            Path:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe"
                            Imagebase:0x110000
                            File size:1189376 bytes
                            MD5 hash:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.351210930.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.352245428.00000000035EE000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Reputation:low

                            Target ID:1
                            Start time:12:42:18
                            Start date:01/10/2022
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp8832.tmp
                            Imagebase:0x10a0000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:2
                            Start time:12:42:18
                            Start date:01/10/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7c72c0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:3
                            Start time:12:42:19
                            Start date:01/10/2022
                            Path:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            Wow64 process (32bit):true
                            Commandline:{path}
                            Imagebase:0x530000
                            File size:1189376 bytes
                            MD5 hash:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.594571838.00000000072D0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.594469574.00000000072C0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.593893494.0000000006FF0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.590737920.0000000005CC0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.593817105.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000003.376885871.0000000006301000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.590108854.0000000005280000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.594220234.00000000072A0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.574094218.0000000002A5D000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.581612836.0000000003A90000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.584965011.0000000003CAE000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.590874533.0000000005CD0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.593962047.0000000007000000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.594928792.0000000007310000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.594066194.0000000007010000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000000.343643595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.593436718.0000000006E80000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.592602875.0000000006540000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.589979363.0000000005050000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.580783944.00000000039C1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.572765724.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Reputation:low

                            Target ID:4
                            Start time:12:42:23
                            Start date:01/10/2022
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp690.tmp
                            Imagebase:0x10a0000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:5
                            Start time:12:42:23
                            Start date:01/10/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7c72c0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:6
                            Start time:12:42:23
                            Start date:01/10/2022
                            Path:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe" 0
                            Imagebase:0xcf0000
                            File size:1189376 bytes
                            MD5 hash:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Reputation:low

                            Target ID:7
                            Start time:12:42:24
                            Start date:01/10/2022
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA4B.tmp
                            Imagebase:0x10a0000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:8
                            Start time:12:42:25
                            Start date:01/10/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7c72c0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:9
                            Start time:12:42:26
                            Start date:01/10/2022
                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                            Imagebase:0x9a0000
                            File size:1189376 bytes
                            MD5 hash:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Antivirus matches:
                            • Detection: 100%, Joe Sandbox ML
                            • Detection: 37%, ReversingLabs
                            Reputation:low

                            Target ID:10
                            Start time:12:42:34
                            Start date:01/10/2022
                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                            Imagebase:0x4b0000
                            File size:1189376 bytes
                            MD5 hash:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:.Net C# or VB.NET
                            Reputation:low

                            Target ID:13
                            Start time:12:43:00
                            Start date:01/10/2022
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2889.tmp
                            Imagebase:0x10a0000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:14
                            Start time:12:43:01
                            Start date:01/10/2022
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp2B48.tmp
                            Imagebase:0x10a0000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:15
                            Start time:12:43:01
                            Start date:01/10/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7c72c0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:16
                            Start time:12:43:01
                            Start date:01/10/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7c72c0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:17
                            Start time:12:43:02
                            Start date:01/10/2022
                            Path:C:\Users\user\Desktop\APPLICATION FORM MASTER SDPO Brilinskiy NEW U.exe
                            Wow64 process (32bit):true
                            Commandline:{path}
                            Imagebase:0x9c0000
                            File size:1189376 bytes
                            MD5 hash:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000011.00000002.500556457.0000000003E59000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000011.00000002.497822993.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                            Target ID:18
                            Start time:12:43:02
                            Start date:01/10/2022
                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            Wow64 process (32bit):true
                            Commandline:{path}
                            Imagebase:0xce0000
                            File size:1189376 bytes
                            MD5 hash:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000012.00000002.502379246.0000000003271000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                            Target ID:19
                            Start time:12:43:15
                            Start date:01/10/2022
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JLsbuY" /XML "C:\Users\user\AppData\Local\Temp\tmp63CD.tmp
                            Imagebase:0x10a0000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language

                            Target ID:20
                            Start time:12:43:16
                            Start date:01/10/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7c72c0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language

                            Target ID:21
                            Start time:12:43:18
                            Start date:01/10/2022
                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            Wow64 process (32bit):true
                            Commandline:{path}
                            Imagebase:0x4f0000
                            File size:1189376 bytes
                            MD5 hash:C5CA6BF1A4D668ABAE8A1BD58DA7FA89
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:.Net C# or VB.NET

                            No disassembly