Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nzCzLT1rR6.exe

Overview

General Information

Sample Name:nzCzLT1rR6.exe
Analysis ID:795911
MD5:2a4d85fb030591cbfa42bbc72f27607e
SHA1:701232edaf6aa4a36509644d69b6a7c55443b1b6
SHA256:d7dc5a4583f409639bf8c10eb62fbbc13ac2e1b8f702425e959d47e64463d45f
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected zgRAT
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • nzCzLT1rR6.exe (PID: 6004 cmdline: C:\Users\user\Desktop\nzCzLT1rR6.exe MD5: 2A4D85FB030591CBFA42BBC72F27607E)
    • nzCzLT1rR6.exe (PID: 1216 cmdline: C:\Users\user\Desktop\nzCzLT1rR6.exe MD5: 2A4D85FB030591CBFA42BBC72F27607E)
      • schtasks.exe (PID: 3940 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp9373.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 4696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6036 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp9539.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • nzCzLT1rR6.exe (PID: 6044 cmdline: C:\Users\user\Desktop\nzCzLT1rR6.exe 0 MD5: 2A4D85FB030591CBFA42BBC72F27607E)
    • nzCzLT1rR6.exe (PID: 5908 cmdline: C:\Users\user\Desktop\nzCzLT1rR6.exe MD5: 2A4D85FB030591CBFA42BBC72F27607E)
  • dhcpmon.exe (PID: 1092 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: 2A4D85FB030591CBFA42BBC72F27607E)
    • dhcpmon.exe (PID: 2108 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 2A4D85FB030591CBFA42BBC72F27607E)
  • dhcpmon.exe (PID: 5780 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: 2A4D85FB030591CBFA42BBC72F27607E)
    • dhcpmon.exe (PID: 5936 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 2A4D85FB030591CBFA42BBC72F27607E)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "be28fce4-4930-4ffe-96ed-0110cf99", "Group": "SecureKMT", "Domain1": "tzitziklishop.ddns.net", "Domain2": "127.0.0.1", "Port": 1665, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.543241972.00000000077C0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x350b:$x1: NanoCore.ClientPluginHost
  • 0x3525:$x2: IClientNetworkHost
00000001.00000002.543241972.00000000077C0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x350b:$x2: NanoCore.ClientPluginHost
  • 0x52b6:$s4: PipeCreated
  • 0x34f8:$s5: IClientLoggingHost
00000001.00000002.543241972.00000000077C0000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x34e2:$x2: NanoCore.ClientPlugin
  • 0x350b:$x3: NanoCore.ClientPluginHost
  • 0x34d3:$i3: IClientNetwork
  • 0x34f8:$i6: IClientLoggingHost
  • 0x3525:$i7: IClientNetworkHost
  • 0x334e:$s1: ClientPlugin
  • 0x34eb:$s1: ClientPlugin
00000001.00000002.543241972.00000000077C0000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x350b:$a1: NanoCore.ClientPluginHost
  • 0x34e2:$a2: NanoCore.ClientPlugin
  • 0x5854:$b7: LogClientException
  • 0x34f8:$b9: IClientLoggingHost
00000012.00000002.333728253.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
Click to see the 102 entries
SourceRuleDescriptionAuthorStrings
1.2.nzCzLT1rR6.exe.3481c8c.2.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x6da5:$x1: NanoCore.ClientPluginHost
  • 0x6dd2:$x2: IClientNetworkHost
1.2.nzCzLT1rR6.exe.3481c8c.2.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x6da5:$x2: NanoCore.ClientPluginHost
  • 0x7d74:$s2: FileCommand
  • 0xc776:$s4: PipeCreated
  • 0x6dbf:$s5: IClientLoggingHost
1.2.nzCzLT1rR6.exe.3481c8c.2.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x6d7f:$x2: NanoCore.ClientPlugin
  • 0x6da5:$x3: NanoCore.ClientPluginHost
  • 0x6d70:$i3: IClientNetwork
  • 0x6d95:$i5: IClientDataHost
  • 0x6dbf:$i6: IClientLoggingHost
  • 0x6dd2:$i7: IClientNetworkHost
  • 0x6de5:$i9: IClientNameObjectCollection
  • 0x6b02:$s1: ClientPlugin
  • 0x6d88:$s1: ClientPlugin
1.2.nzCzLT1rR6.exe.3481c8c.2.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x6da5:$a1: NanoCore.ClientPluginHost
  • 0x6d7f:$a2: NanoCore.ClientPlugin
  • 0x6dbf:$b9: IClientLoggingHost
1.2.nzCzLT1rR6.exe.5016920.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xd9ad:$x1: NanoCore.ClientPluginHost
  • 0xd9da:$x2: IClientNetworkHost
Click to see the 273 entries

AV Detection

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\nzCzLT1rR6.exe, ProcessId: 1216, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

E-Banking Fraud

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\nzCzLT1rR6.exe, ProcessId: 1216, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Persistence and Installation Behavior

barindex
Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp9373.tmp, CommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp9373.tmp, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\nzCzLT1rR6.exe, ParentImage: C:\Users\user\Desktop\nzCzLT1rR6.exe, ParentProcessId: 1216, ParentProcessName: nzCzLT1rR6.exe, ProcessCommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp9373.tmp, ProcessId: 3940, ProcessName: schtasks.exe

Stealing of Sensitive Information

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\nzCzLT1rR6.exe, ProcessId: 1216, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Remote Access Functionality

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\nzCzLT1rR6.exe, ProcessId: 1216, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
Timestamp:192.168.2.345.12.253.264970216652816766 02/01/23-13:18:00.977494
SID:2816766
Source Port:49702
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264969816652816766 02/01/23-13:17:24.114380
SID:2816766
Source Port:49698
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:45.12.253.26192.168.2.31665496982841753 02/01/23-13:17:23.356204
SID:2841753
Source Port:1665
Destination Port:49698
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970016652025019 02/01/23-13:17:38.752931
SID:2025019
Source Port:49700
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:45.12.253.26192.168.2.31665497002841753 02/01/23-13:17:43.786170
SID:2841753
Source Port:1665
Destination Port:49700
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264971016652025019 02/01/23-13:18:53.106687
SID:2025019
Source Port:49710
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970116652816718 02/01/23-13:17:51.941680
SID:2816718
Source Port:49701
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:45.12.253.26192.168.2.31665497012810290 02/01/23-13:17:50.835717
SID:2810290
Source Port:1665
Destination Port:49701
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970916652816766 02/01/23-13:18:47.985288
SID:2816766
Source Port:49709
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970416652025019 02/01/23-13:18:12.511200
SID:2025019
Source Port:49704
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970516652816766 02/01/23-13:18:21.103350
SID:2816766
Source Port:49705
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264971116652816766 02/01/23-13:19:05.431254
SID:2816766
Source Port:49711
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264969916652025019 02/01/23-13:17:29.785359
SID:2025019
Source Port:49699
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264971016652816718 02/01/23-13:18:54.276262
SID:2816718
Source Port:49710
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970716652025019 02/01/23-13:18:33.167648
SID:2025019
Source Port:49707
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970616652816766 02/01/23-13:18:27.570835
SID:2816766
Source Port:49706
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970316652025019 02/01/23-13:18:06.200920
SID:2025019
Source Port:49703
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264969816652025019 02/01/23-13:17:18.638360
SID:2025019
Source Port:49698
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970916652025019 02/01/23-13:18:47.017681
SID:2025019
Source Port:49709
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264971216652025019 02/01/23-13:19:24.159023
SID:2025019
Source Port:49712
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970616652025019 02/01/23-13:18:26.207894
SID:2025019
Source Port:49706
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970316652816766 02/01/23-13:18:07.370216
SID:2816766
Source Port:49703
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970716652816766 02/01/23-13:18:34.782616
SID:2816766
Source Port:49707
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970216652025019 02/01/23-13:17:57.465792
SID:2025019
Source Port:49702
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970816652816766 02/01/23-13:18:41.773314
SID:2816766
Source Port:49708
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970116652816766 02/01/23-13:17:51.941680
SID:2816766
Source Port:49701
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970816652025019 02/01/23-13:18:40.027997
SID:2025019
Source Port:49708
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264969916652816766 02/01/23-13:17:30.963105
SID:2816766
Source Port:49699
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970016652816766 02/01/23-13:17:43.841016
SID:2816766
Source Port:49700
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264971116652025019 02/01/23-13:19:04.505055
SID:2025019
Source Port:49711
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970516652025019 02/01/23-13:18:20.346491
SID:2025019
Source Port:49705
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970116652025019 02/01/23-13:17:50.278538
SID:2025019
Source Port:49701
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264970416652816766 02/01/23-13:18:13.411136
SID:2816766
Source Port:49704
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.345.12.253.264971016652816766 02/01/23-13:18:55.458400
SID:2816766
Source Port:49710
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: nzCzLT1rR6.exeReversingLabs: Detection: 28%
Source: nzCzLT1rR6.exeVirustotal: Detection: 30%Perma Link
Source: tzitziklishop.ddns.netAvira URL Cloud: Label: malware
Source: tzitziklishop.ddns.netVirustotal: Detection: 12%Perma Link
Source: tzitziklishop.ddns.netVirustotal: Detection: 12%Perma Link
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 28%
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.5016920.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.6970000.24.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.3c305f4.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.6974629.25.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.6970000.24.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.3c305f4.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4eba3a9.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4eb0f4a.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.3c34c1d.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.nzCzLT1rR6.exe.3e4ca48.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.3c2b7be.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.5016920.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.nzCzLT1rR6.exe.3d0a598.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.nzCzLT1rR6.exe.3dab980.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.5011aea.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.501af49.16.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4dafe3a.15.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4d9b80d.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4d8f5d9.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000012.00000002.333728253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.540954705.0000000006970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.347590788.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.269552215.0000000003C6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.341628042.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.343896374.0000000003BE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: nzCzLT1rR6.exe PID: 6004, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: nzCzLT1rR6.exe PID: 1216, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: nzCzLT1rR6.exe PID: 5908, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2108, type: MEMORYSTR
Source: nzCzLT1rR6.exeJoe Sandbox ML: detected
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
Source: 18.2.nzCzLT1rR6.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 1.2.nzCzLT1rR6.exe.6970000.24.unpackAvira: Label: TR/NanoCore.fadte
Source: 00000013.00000002.347590788.0000000003231000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "be28fce4-4930-4ffe-96ed-0110cf99", "Group": "SecureKMT", "Domain1": "tzitziklishop.ddns.net", "Domain2": "127.0.0.1", "Port": 1665, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
Source: nzCzLT1rR6.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: nzCzLT1rR6.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: Sjrh.pdb source: nzCzLT1rR6.exe, dhcpmon.exe.1.dr
Source: Binary string: Sjrh.pdbSHA256 source: nzCzLT1rR6.exe, dhcpmon.exe.1.dr
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.540666148.0000000006700000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.542239209.0000000006E20000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.542942575.0000000007790000.00000004.08000000.00040000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: nzCzLT1rR6.exe, 00000001.00000002.540605869.00000000066F0000.00000004.08000000.00040000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.542851502.0000000007780000.00000004.08000000.00040000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.540745789.0000000006710000.00000004.08000000.00040000.00000000.sdmp
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]1_2_06E3B348
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]1_2_079925E8
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]1_2_079925D8

Networking

barindex
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49698 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49698 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.12.253.26:1665 -> 192.168.2.3:49698
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49699 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49699 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49700 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49700 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.12.253.26:1665 -> 192.168.2.3:49700
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49701 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 45.12.253.26:1665 -> 192.168.2.3:49701
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49701 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.3:49701 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49702 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49702 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49703 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49703 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49704 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49704 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49705 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49705 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49706 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49706 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49707 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49707 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49708 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49708 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49709 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49709 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49710 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49710 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.3:49710 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49711 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49711 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49712 -> 45.12.253.26:1665
Source: Malware configuration extractorURLs: tzitziklishop.ddns.net
Source: Malware configuration extractorURLs: 127.0.0.1
Source: unknownDNS query: name: tzitziklishop.ddns.net
Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
Source: Joe Sandbox ViewIP Address: 45.12.253.26 45.12.253.26
Source: global trafficTCP traffic: 192.168.2.3:49698 -> 45.12.253.26:1665
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.542851502.0000000007780000.00000004.08000000.00040000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://google.com
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
Source: nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
Source: unknownDNS traffic detected: queries for: tzitziklishop.ddns.net
Source: nzCzLT1rR6.exe, 00000000.00000002.266033645.0000000000F00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

E-Banking Fraud

barindex
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.5016920.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.6970000.24.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.3c305f4.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.6974629.25.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.6970000.24.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.3c305f4.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4eba3a9.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4eb0f4a.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.3c34c1d.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.nzCzLT1rR6.exe.3e4ca48.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.3c2b7be.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.5016920.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.nzCzLT1rR6.exe.3d0a598.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.nzCzLT1rR6.exe.3dab980.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.5011aea.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.501af49.16.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4dafe3a.15.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4d9b80d.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4d8f5d9.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000012.00000002.333728253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.540954705.0000000006970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.347590788.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.269552215.0000000003C6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.341628042.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.343896374.0000000003BE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: nzCzLT1rR6.exe PID: 6004, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: nzCzLT1rR6.exe PID: 1216, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: nzCzLT1rR6.exe PID: 5908, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2108, type: MEMORYSTR

System Summary

barindex
Source: 1.2.nzCzLT1rR6.exe.3481c8c.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.3481c8c.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.3481c8c.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.5016920.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.5016920.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.5016920.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.66b0000.19.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.66b0000.19.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.66b0000.19.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 18.2.nzCzLT1rR6.exe.2c49530.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.nzCzLT1rR6.exe.2c49530.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 18.2.nzCzLT1rR6.exe.2c49530.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.6710000.22.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.6710000.22.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.6710000.22.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.7780000.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.7780000.27.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.7780000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.4f827f7.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.4f827f7.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.4f827f7.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.nzCzLT1rR6.exe.4f827f7.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.6970000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.6970000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.6970000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.77de8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.77de8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.77de8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 18.2.nzCzLT1rR6.exe.3c305f4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.nzCzLT1rR6.exe.3c305f4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 18.2.nzCzLT1rR6.exe.3c305f4.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.6700000.21.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.6700000.21.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.6700000.21.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.66a0000.18.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.66a0000.18.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.66a0000.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.4f99a56.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.4f99a56.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.4f99a56.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.7790000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.7790000.28.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.7790000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.4f827f7.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.4f827f7.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.4f827f7.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.4d8f5d9.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.4d8f5d9.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.4d8f5d9.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 19.2.dhcpmon.exe.3299658.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 19.2.dhcpmon.exe.3299658.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 19.2.dhcpmon.exe.3299658.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.7950000.34.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.7950000.34.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.7950000.34.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.66f0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.66f0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.66f0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.6e20000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.6e20000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.6e20000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.6710000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.6710000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.6710000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.nzCzLT1rR6.exe.2c87fd0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.77a0000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.77a0000.29.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.77a0000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.6974629.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.6974629.25.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.6974629.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.6970000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.6970000.24.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.6970000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.3475a44.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.3475a44.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.3475a44.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.77a0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.77a0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.77a0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.7780000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.7780000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.7780000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 18.2.nzCzLT1rR6.exe.3c305f4.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.nzCzLT1rR6.exe.3c305f4.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 18.2.nzCzLT1rR6.exe.3c305f4.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.4f8b626.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.4f8b626.14.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.4f8b626.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.4f8b626.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.4f8b626.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.4f8b626.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.4eba3a9.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.4eba3a9.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.4eba3a9.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.nzCzLT1rR6.exe.4eba3a9.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.77d0000.33.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.66a0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.77d0000.33.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.77d0000.33.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.66a0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.66a0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.77d4c9f.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.77d4c9f.31.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.77d4c9f.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.7950000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.7950000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.7950000.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.4d9b80d.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.4d9b80d.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.4d9b80d.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.4f99a56.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.4f99a56.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.4f99a56.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.7790000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.7790000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.7790000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.5e40000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.5e40000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.5e40000.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 7.2.dhcpmon.exe.29f4360.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.4eb0f4a.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.4eb0f4a.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.4eb0f4a.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.nzCzLT1rR6.exe.4eb0f4a.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.66b0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.66b0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.66b0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.77d0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.77d0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.77d0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.6700000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.6700000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.6700000.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.77c0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.77c0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.77c0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 18.2.nzCzLT1rR6.exe.3c34c1d.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.nzCzLT1rR6.exe.3c34c1d.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 18.2.nzCzLT1rR6.exe.3c34c1d.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 7.2.dhcpmon.exe.2a1800c.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.77c0000.30.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.77c0000.30.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.77c0000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.nzCzLT1rR6.exe.2c64324.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
Source: 0.2.nzCzLT1rR6.exe.3e4ca48.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.nzCzLT1rR6.exe.3e4ca48.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.nzCzLT1rR6.exe.3e4ca48.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.nzCzLT1rR6.exe.3e4ca48.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 18.2.nzCzLT1rR6.exe.3c2b7be.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.nzCzLT1rR6.exe.3c2b7be.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 18.2.nzCzLT1rR6.exe.3c2b7be.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 18.2.nzCzLT1rR6.exe.3c2b7be.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.5016920.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.5016920.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.nzCzLT1rR6.exe.5016920.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.nzCzLT1rR6.exe.3d0a598.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.nzCzLT1rR6.exe.3d0a598.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
Source: 0.2.nzCzLT1rR6.exe.3d0a598.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.nzCzLT1rR6.exe.3d0a598.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.nzCzLT1rR6.exe.3d0a598.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.nzCzLT1rR6.exe.3dab980.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.nzCzLT1rR6.exe.3dab980.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.nzCzLT1rR6.exe.3dab980.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.nzCzLT1rR6.exe.3dab980.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.5011aea.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.5011aea.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.nzCzLT1rR6.exe.5011aea.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.501af49.16.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.501af49.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.nzCzLT1rR6.exe.501af49.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.3481c8c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.3481c8c.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.nzCzLT1rR6.exe.3481c8c.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.4dafe3a.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 1.2.nzCzLT1rR6.exe.4dafe3a.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.4dafe3a.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.nzCzLT1rR6.exe.4dafe3a.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.3475a44.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.3475a44.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.nzCzLT1rR6.exe.3475a44.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.4d9b80d.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.4d9b80d.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.nzCzLT1rR6.exe.4d8f5d9.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.4d8f5d9.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.nzCzLT1rR6.exe.4d8f5d9.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.4d9b80d.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.nzCzLT1rR6.exe.341c974.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.nzCzLT1rR6.exe.341c974.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.nzCzLT1rR6.exe.341c974.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.543241972.00000000077C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.543241972.00000000077C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.543241972.00000000077C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000012.00000002.333728253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000012.00000002.333728253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000012.00000002.333728253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.543793463.0000000007950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.543793463.0000000007950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.543793463.0000000007950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.543011972.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.543011972.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.543011972.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.540605869.00000000066F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.540605869.00000000066F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.540605869.00000000066F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.539921982.0000000005E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.539921982.0000000005E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.539921982.0000000005E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.540271148.00000000066B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.540271148.00000000066B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.540271148.00000000066B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.542851502.0000000007780000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.542851502.0000000007780000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.542851502.0000000007780000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.540954705.0000000006970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.540954705.0000000006970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.540954705.0000000006970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.540194138.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.540194138.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.540194138.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000003.287933444.0000000006D26000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.542239209.0000000006E20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.542239209.0000000006E20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.542239209.0000000006E20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000013.00000002.347590788.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000013.00000002.347590788.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.540666148.0000000006700000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.540666148.0000000006700000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.540666148.0000000006700000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.542942575.0000000007790000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.542942575.0000000007790000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.542942575.0000000007790000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000000.00000002.269552215.0000000003C6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.269552215.0000000003C6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.269552215.0000000003C6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.540745789.0000000006710000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.540745789.0000000006710000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.540745789.0000000006710000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000012.00000002.341628042.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000012.00000002.341628042.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000012.00000002.343896374.0000000003BE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000012.00000002.343896374.0000000003BE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.543341019.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000001.00000002.543341019.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.543341019.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: nzCzLT1rR6.exe PID: 6004, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: nzCzLT1rR6.exe PID: 6004, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: nzCzLT1rR6.exe PID: 6004, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: nzCzLT1rR6.exe PID: 1216, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: nzCzLT1rR6.exe PID: 1216, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: nzCzLT1rR6.exe PID: 5908, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: nzCzLT1rR6.exe PID: 5908, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: nzCzLT1rR6.exe PID: 5908, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: dhcpmon.exe PID: 2108, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: dhcpmon.exe PID: 2108, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: nzCzLT1rR6.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 1.2.nzCzLT1rR6.exe.3481c8c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.3481c8c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.3481c8c.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.3481c8c.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.5016920.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.5016920.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.5016920.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.5016920.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.66b0000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.66b0000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.66b0000.19.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.66b0000.19.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 18.2.nzCzLT1rR6.exe.2c49530.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.nzCzLT1rR6.exe.2c49530.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.nzCzLT1rR6.exe.2c49530.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 18.2.nzCzLT1rR6.exe.2c49530.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.6710000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.6710000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.6710000.22.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.6710000.22.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.7780000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.7780000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.7780000.27.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.7780000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.4f827f7.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4f827f7.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4f827f7.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.4f827f7.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.nzCzLT1rR6.exe.4f827f7.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.6970000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.6970000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.6970000.24.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.6970000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.77de8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.77de8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.77de8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.77de8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 18.2.nzCzLT1rR6.exe.3c305f4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.nzCzLT1rR6.exe.3c305f4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.nzCzLT1rR6.exe.3c305f4.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 18.2.nzCzLT1rR6.exe.3c305f4.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.6700000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.6700000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.6700000.21.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.6700000.21.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.66a0000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.66a0000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.66a0000.18.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.66a0000.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.4f99a56.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4f99a56.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4f99a56.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.4f99a56.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.7790000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.7790000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.7790000.28.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.7790000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.4f827f7.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4f827f7.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4f827f7.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.4f827f7.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.4d8f5d9.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4d8f5d9.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4d8f5d9.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.4d8f5d9.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 19.2.dhcpmon.exe.3299658.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 19.2.dhcpmon.exe.3299658.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 19.2.dhcpmon.exe.3299658.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 19.2.dhcpmon.exe.3299658.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.7950000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.7950000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.7950000.34.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.7950000.34.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.66f0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.66f0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.66f0000.20.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.66f0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.6e20000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.6e20000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.6e20000.26.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.6e20000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.6710000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.6710000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.6710000.22.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.6710000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.nzCzLT1rR6.exe.2c87fd0.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
Source: 1.2.nzCzLT1rR6.exe.77a0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.77a0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.77a0000.29.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.77a0000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.6974629.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.6974629.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.6974629.25.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.6974629.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.6970000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.6970000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.6970000.24.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.6970000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.3475a44.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.3475a44.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.3475a44.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.3475a44.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.77a0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.77a0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.77a0000.29.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.77a0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.7780000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.7780000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.7780000.27.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.7780000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 18.2.nzCzLT1rR6.exe.3c305f4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.nzCzLT1rR6.exe.3c305f4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.nzCzLT1rR6.exe.3c305f4.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 18.2.nzCzLT1rR6.exe.3c305f4.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.4f8b626.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4f8b626.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4f8b626.14.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.4f8b626.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.4f8b626.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4f8b626.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4f8b626.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.4f8b626.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.4eba3a9.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4eba3a9.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4eba3a9.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.4eba3a9.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.nzCzLT1rR6.exe.4eba3a9.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.77d0000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.77d0000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.66a0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.66a0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.77d0000.33.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.77d0000.33.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.66a0000.18.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.66a0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.77d4c9f.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.77d4c9f.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.77d4c9f.31.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.77d4c9f.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.7950000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.7950000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.7950000.34.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.7950000.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.4d9b80d.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4d9b80d.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4d9b80d.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.4d9b80d.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.4f99a56.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4f99a56.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4f99a56.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.4f99a56.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.7790000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.7790000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.7790000.28.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.7790000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.5e40000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.5e40000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.5e40000.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.5e40000.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 7.2.dhcpmon.exe.29f4360.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
Source: 1.2.nzCzLT1rR6.exe.4eb0f4a.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4eb0f4a.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4eb0f4a.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.4eb0f4a.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.nzCzLT1rR6.exe.4eb0f4a.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.66b0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.66b0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.66b0000.19.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.66b0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.77d0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.77d0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.77d0000.33.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.77d0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.6700000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.6700000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.6700000.21.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.6700000.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.77c0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.77c0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.77c0000.30.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.77c0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 18.2.nzCzLT1rR6.exe.3c34c1d.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.nzCzLT1rR6.exe.3c34c1d.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.nzCzLT1rR6.exe.3c34c1d.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 18.2.nzCzLT1rR6.exe.3c34c1d.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 7.2.dhcpmon.exe.2a1800c.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
Source: 1.2.nzCzLT1rR6.exe.77c0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.77c0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.77c0000.30.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.77c0000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.nzCzLT1rR6.exe.2c64324.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
Source: 0.2.nzCzLT1rR6.exe.3e4ca48.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.nzCzLT1rR6.exe.3e4ca48.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.nzCzLT1rR6.exe.3e4ca48.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.nzCzLT1rR6.exe.3e4ca48.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 18.2.nzCzLT1rR6.exe.3c2b7be.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.nzCzLT1rR6.exe.3c2b7be.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.nzCzLT1rR6.exe.3c2b7be.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 18.2.nzCzLT1rR6.exe.3c2b7be.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 18.2.nzCzLT1rR6.exe.3c2b7be.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.5016920.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.5016920.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.nzCzLT1rR6.exe.5016920.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.nzCzLT1rR6.exe.3d0a598.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.nzCzLT1rR6.exe.3d0a598.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
Source: 0.2.nzCzLT1rR6.exe.3d0a598.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.nzCzLT1rR6.exe.3d0a598.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.nzCzLT1rR6.exe.3d0a598.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.nzCzLT1rR6.exe.3dab980.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.nzCzLT1rR6.exe.3dab980.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.nzCzLT1rR6.exe.3dab980.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.nzCzLT1rR6.exe.3dab980.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.5011aea.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.5011aea.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.nzCzLT1rR6.exe.5011aea.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.501af49.16.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.501af49.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.nzCzLT1rR6.exe.501af49.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.3481c8c.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.3481c8c.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.nzCzLT1rR6.exe.3481c8c.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.4dafe3a.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.nzCzLT1rR6.exe.4dafe3a.15.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.4dafe3a.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.nzCzLT1rR6.exe.4dafe3a.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.3475a44.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.3475a44.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.nzCzLT1rR6.exe.3475a44.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.4d9b80d.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.4d9b80d.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.nzCzLT1rR6.exe.4d8f5d9.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.4d8f5d9.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.nzCzLT1rR6.exe.4d8f5d9.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.4d9b80d.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.nzCzLT1rR6.exe.341c974.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.nzCzLT1rR6.exe.341c974.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.nzCzLT1rR6.exe.341c974.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.543241972.00000000077C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.543241972.00000000077C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.543241972.00000000077C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.543241972.00000000077C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000012.00000002.333728253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000012.00000002.333728253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000012.00000002.333728253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.543793463.0000000007950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.543793463.0000000007950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.543793463.0000000007950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.543793463.0000000007950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.543011972.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.543011972.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.543011972.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.543011972.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.540605869.00000000066F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540605869.00000000066F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540605869.00000000066F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.540605869.00000000066F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.539921982.0000000005E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.539921982.0000000005E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.539921982.0000000005E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.539921982.0000000005E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.540271148.00000000066B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540271148.00000000066B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540271148.00000000066B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.540271148.00000000066B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.542851502.0000000007780000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.542851502.0000000007780000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.542851502.0000000007780000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.542851502.0000000007780000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.540954705.0000000006970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540954705.0000000006970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540954705.0000000006970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.540954705.0000000006970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.540194138.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540194138.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540194138.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.540194138.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000003.287933444.0000000006D26000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.542239209.0000000006E20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.542239209.0000000006E20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.542239209.0000000006E20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.542239209.0000000006E20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000013.00000002.347590788.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000013.00000002.347590788.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.540666148.0000000006700000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540666148.0000000006700000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540666148.0000000006700000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.540666148.0000000006700000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.542942575.0000000007790000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.542942575.0000000007790000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.542942575.0000000007790000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.542942575.0000000007790000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000000.00000002.269552215.0000000003C6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.269552215.0000000003C6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.269552215.0000000003C6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.540745789.0000000006710000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540745789.0000000006710000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.540745789.0000000006710000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.540745789.0000000006710000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000012.00000002.341628042.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000012.00000002.341628042.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000012.00000002.343896374.0000000003BE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000012.00000002.343896374.0000000003BE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.543341019.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.543341019.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.543341019.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.543341019.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: nzCzLT1rR6.exe PID: 6004, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: nzCzLT1rR6.exe PID: 6004, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: nzCzLT1rR6.exe PID: 6004, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: nzCzLT1rR6.exe PID: 1216, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: nzCzLT1rR6.exe PID: 1216, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: nzCzLT1rR6.exe PID: 5908, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: nzCzLT1rR6.exe PID: 5908, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: nzCzLT1rR6.exe PID: 5908, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: dhcpmon.exe PID: 2108, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: dhcpmon.exe PID: 2108, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 0_2_0106C0DC0_2_0106C0DC
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 0_2_0106EAB00_2_0106EAB0
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 0_2_0106EAB80_2_0106EAB8
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 0_2_07608F200_2_07608F20
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 0_2_076000060_2_07600006
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_019FE4801_2_019FE480
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_019FE4711_2_019FE471
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_019FBBD41_2_019FBBD4
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_06E300401_2_06E30040
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_06E37C081_2_06E37C08
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_06E38A781_2_06E38A78
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_06E38B361_2_06E38B36
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_079936981_2_07993698
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_079945081_2_07994508
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_079915381_2_07991538
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_07990C581_2_07990C58
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_0799F33A1_2_0799F33A
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_0799BA201_2_0799BA20
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_0799B1501_2_0799B150
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_079900401_2_07990040
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_0799AE081_2_0799AE08
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_079945D61_2_079945D6
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_07990D161_2_07990D16
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_024FC0DC5_2_024FC0DC
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_024FEAA85_2_024FEAA8
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_024FEAB85_2_024FEAB8
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_08008F205_2_08008F20
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_080000125_2_08000012
Source: nzCzLT1rR6.exe, 00000000.00000002.291524529.00000000073B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000000.00000000.249418548.0000000000772000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSjrh.exe8 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000000.00000002.266033645.0000000000F00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000000.00000002.269552215.0000000003C6C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000000.00000002.269552215.0000000003B69000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.543011972.00000000077A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.540605869.00000000066F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.540271148.00000000066B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.542851502.0000000007780000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.543241972.00000000077C8000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.540954705.0000000006970000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.540954705.0000000006970000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.540194138.00000000066A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000003.287933444.0000000006D26000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.542239209.0000000006E20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.540666148.0000000006700000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.543793463.000000000795E000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.542942575.0000000007790000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.540745789.0000000006710000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.540915934.0000000006950000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.518341894.00000000017FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.543341019.00000000077D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.543341019.00000000077D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.543341019.00000000077F8000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004471000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000005.00000002.308811439.0000000003941000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000005.00000002.308811439.0000000003A88000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000012.00000002.341628042.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000012.00000002.341628042.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000012.00000002.343896374.0000000003BE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000012.00000002.343896374.0000000003BE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exe, 00000012.00000002.343896374.0000000003BE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exeBinary or memory string: OriginalFilenameSjrh.exe8 vs nzCzLT1rR6.exe
Source: nzCzLT1rR6.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: dhcpmon.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: nzCzLT1rR6.exeReversingLabs: Detection: 28%
Source: nzCzLT1rR6.exeVirustotal: Detection: 30%
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeFile read: C:\Users\user\Desktop\nzCzLT1rR6.exeJump to behavior
Source: nzCzLT1rR6.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\nzCzLT1rR6.exe C:\Users\user\Desktop\nzCzLT1rR6.exe
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess created: C:\Users\user\Desktop\nzCzLT1rR6.exe C:\Users\user\Desktop\nzCzLT1rR6.exe
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp9373.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp9539.tmp
Source: unknownProcess created: C:\Users\user\Desktop\nzCzLT1rR6.exe C:\Users\user\Desktop\nzCzLT1rR6.exe 0
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess created: C:\Users\user\Desktop\nzCzLT1rR6.exe C:\Users\user\Desktop\nzCzLT1rR6.exe
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess created: C:\Users\user\Desktop\nzCzLT1rR6.exe C:\Users\user\Desktop\nzCzLT1rR6.exeJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp9373.tmpJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp9539.tmpJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess created: C:\Users\user\Desktop\nzCzLT1rR6.exe C:\Users\user\Desktop\nzCzLT1rR6.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\nzCzLT1rR6.exe.logJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeFile created: C:\Users\user\AppData\Local\Temp\tmp9373.tmpJump to behavior
Source: classification engineClassification label: mal100.troj.evad.winEXE@18/11@15/1
Source: nzCzLT1rR6.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6008:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4696:120:WilError_01
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{be28fce4-4930-4ffe-96ed-0110cf99b889}
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
Source: nzCzLT1rR6.exeString found in binary or memory: -----------------------------------------------------------------Starting turn
Source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
Source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
Source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: nzCzLT1rR6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: nzCzLT1rR6.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: nzCzLT1rR6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: Sjrh.pdb source: nzCzLT1rR6.exe, dhcpmon.exe.1.dr
Source: Binary string: Sjrh.pdbSHA256 source: nzCzLT1rR6.exe, dhcpmon.exe.1.dr
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.540666148.0000000006700000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.542239209.0000000006E20000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.542942575.0000000007790000.00000004.08000000.00040000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: nzCzLT1rR6.exe, 00000001.00000002.540605869.00000000066F0000.00000004.08000000.00040000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.542851502.0000000007780000.00000004.08000000.00040000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.540745789.0000000006710000.00000004.08000000.00040000.00000000.sdmp

Data Obfuscation

barindex
Source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 0_2_0106E3E8 push esp; iretd 0_2_0106E3E9
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 0_2_076035FF push ebp; retf 0_2_0760360E
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_06E3C58B push es; retf 1_2_06E3C58C
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_06E3CE7F push esp; retn 066Dh1_2_06E3CF59
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_07971A18 push FFFFFF8Bh; iretd 1_2_07971A1B
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_07992771 push es; ret 1_2_079927A0
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_079926F8 push es; ret 1_2_079927A0
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_0799F338 push eax; ret 1_2_0799F339
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_024FDDF0 pushfd ; retf 5_2_024FF8FD
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_024FE3E8 push esp; iretd 5_2_024FE3E9
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_0800481C pushfd ; retf 5_2_0800481D
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_08002824 pushfd ; retf 5_2_08002825
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_08000831 pushfd ; retf 5_2_08000832
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_080008A7 pushfd ; retf 5_2_080008A8
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_080008EA pushfd ; retf 5_2_080008EB
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_08000AFF pushfd ; retf 5_2_08000B00
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_08000B85 pushfd ; retf 5_2_08000B86
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_08000CF5 pushfd ; retf 5_2_08000CF7
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_08004F46 pushfd ; retf 5_2_08004F47
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_08000F4C pushfd ; retf 5_2_08000F4D
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_08002207 pushfd ; retf 5_2_08002208
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_08002258 pushfd ; retf 5_2_08002259
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_08000261 pushfd ; retf 5_2_08000262
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_08004296 pushfd ; retf 5_2_08004297
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_08006439 pushfd ; retf 5_2_08006446
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_08004468 pushfd ; retf 5_2_08004469
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_08006521 pushfd ; retf 5_2_0800652E
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_0800257D pushfd ; retf 5_2_0800257E
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_080065C7 pushfd ; retf 5_2_080065D6
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_08002639 pushfd ; retf 5_2_0800263A
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_080026A5 pushfd ; retf 5_2_080026A6
Source: initial sampleStatic PE information: section name: .text entropy: 7.413609935503911
Source: initial sampleStatic PE information: section name: .text entropy: 7.413609935503911
Source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp9373.tmp

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeFile opened: C:\Users\user\Desktop\nzCzLT1rR6.exe:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: Yara matchFile source: 0.2.nzCzLT1rR6.exe.2c87fd0.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.dhcpmon.exe.29f4360.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.dhcpmon.exe.2a1800c.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.nzCzLT1rR6.exe.2c64324.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000007.00000002.313319799.00000000029F4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.267300740.0000000002C64000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: nzCzLT1rR6.exe PID: 6004, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1092, type: MEMORYSTR
Source: nzCzLT1rR6.exe, 00000000.00000002.267300740.0000000002C64000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000005.00000002.306231145.00000000029A5000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000007.00000002.313319799.00000000029F4000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000A.00000002.336021238.0000000002F85000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
Source: nzCzLT1rR6.exe, 00000000.00000002.267300740.0000000002C64000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000005.00000002.306231145.00000000029A5000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000007.00000002.313319799.00000000029F4000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 0000000A.00000002.336021238.0000000002F85000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
Source: C:\Users\user\Desktop\nzCzLT1rR6.exe TID: 5984Thread sleep time: -37665s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exe TID: 5952Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exe TID: 2088Thread sleep time: -7378697629483816s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exe TID: 6048Thread sleep time: -37665s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exe TID: 3268Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1952Thread sleep time: -37665s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4488Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6120Thread sleep time: -37665s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5392Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exe TID: 5960Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5788Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3800Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_024FDFC7 rdtsc 5_2_024FDFC7
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWindow / User API: threadDelayed 9339Jump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWindow / User API: foregroundWindowGot 645Jump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWindow / User API: foregroundWindowGot 692Jump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeThread delayed: delay time: 37665Jump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeThread delayed: delay time: 37665Jump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 37665Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 37665Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: dhcpmon.exe, 0000000A.00000002.336021238.0000000002F85000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: dhcpmon.exe, 0000000A.00000002.336021238.0000000002F85000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
Source: nzCzLT1rR6.exe, 00000001.00000002.518341894.00000000018B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll9,
Source: nzCzLT1rR6.exe, 00000000.00000003.265418982.0000000007340000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VmCiu
Source: dhcpmon.exe, 0000000A.00000002.336021238.0000000002F85000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
Source: dhcpmon.exe, 0000000A.00000002.336021238.0000000002F85000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 5_2_024FDFC7 rdtsc 5_2_024FDFC7
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeMemory written: C:\Users\user\Desktop\nzCzLT1rR6.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeMemory written: C:\Users\user\Desktop\nzCzLT1rR6.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess created: C:\Users\user\Desktop\nzCzLT1rR6.exe C:\Users\user\Desktop\nzCzLT1rR6.exeJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp9373.tmpJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp9539.tmpJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeProcess created: C:\Users\user\Desktop\nzCzLT1rR6.exe C:\Users\user\Desktop\nzCzLT1rR6.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.0000000003991000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.544211048.0000000007C7C000.00000004.00000010.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000039D7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: nzCzLT1rR6.exe, 00000001.00000002.542809708.000000000777C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager`
Source: nzCzLT1rR6.exe, 00000001.00000002.542499939.00000000070BC000.00000004.00000010.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.544282596.0000000007E7C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager`
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000039D7000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.521288702.0000000003709000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerHa
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Users\user\Desktop\nzCzLT1rR6.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Users\user\Desktop\nzCzLT1rR6.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Users\user\Desktop\nzCzLT1rR6.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Users\user\Desktop\nzCzLT1rR6.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeCode function: 1_2_07991D40 GetSystemTimes,1_2_07991D40
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\nzCzLT1rR6.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

Stealing of Sensitive Information

barindex
Source: Yara matchFile source: 0.2.nzCzLT1rR6.exe.3d0a598.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.5016920.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.6970000.24.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.3c305f4.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.6974629.25.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.6970000.24.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.3c305f4.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4eba3a9.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4eb0f4a.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.3c34c1d.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.nzCzLT1rR6.exe.3e4ca48.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.3c2b7be.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.5016920.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.nzCzLT1rR6.exe.3d0a598.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.nzCzLT1rR6.exe.3dab980.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.5011aea.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.501af49.16.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4dafe3a.15.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4d9b80d.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4d8f5d9.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000012.00000002.333728253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.540954705.0000000006970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.347590788.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.269552215.0000000003C6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.341628042.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.343896374.0000000003BE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: nzCzLT1rR6.exe PID: 6004, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: nzCzLT1rR6.exe PID: 1216, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: nzCzLT1rR6.exe PID: 5908, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2108, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara matchFile source: 0.2.nzCzLT1rR6.exe.3d0a598.12.raw.unpack, type: UNPACKEDPE
Source: nzCzLT1rR6.exe, 00000000.00000002.269552215.0000000003C6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000001.00000002.543241972.00000000077C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000001.00000002.543011972.00000000077A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000001.00000002.543793463.0000000007950000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000001.00000002.540605869.00000000066F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000001.00000002.540605869.00000000066F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: nzCzLT1rR6.exe, 00000001.00000002.540271148.00000000066B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000001.00000002.542851502.0000000007780000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: nzCzLT1rR6.exe, 00000001.00000002.540954705.0000000006970000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000001.00000002.540194138.00000000066A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: nzCzLT1rR6.exe, 00000001.00000003.287933444.0000000006D26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: nzCzLT1rR6.exe, 00000001.00000002.542239209.0000000006E20000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000001.00000002.542239209.0000000006E20000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: nzCzLT1rR6.exe, 00000001.00000002.540666148.0000000006700000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000001.00000002.542942575.0000000007790000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000001.00000002.542942575.0000000007790000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: nzCzLT1rR6.exe, 00000001.00000002.540745789.0000000006710000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000001.00000002.540745789.0000000006710000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: nzCzLT1rR6.exe, 00000001.00000002.543341019.00000000077D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000012.00000002.333728253.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000012.00000002.341628042.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000012.00000002.341628042.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: nzCzLT1rR6.exe, 00000012.00000002.343896374.0000000003BE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: nzCzLT1rR6.exe, 00000012.00000002.343896374.0000000003BE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: dhcpmon.exe, 00000013.00000002.347590788.0000000003231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 00000013.00000002.347590788.0000000003231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.5016920.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.6970000.24.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.3c305f4.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.6974629.25.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.6970000.24.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.3c305f4.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4eb5d80.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4eba3a9.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4eb0f4a.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.3c34c1d.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.nzCzLT1rR6.exe.3e4ca48.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.nzCzLT1rR6.exe.3c2b7be.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.5016920.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.nzCzLT1rR6.exe.3d0a598.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.nzCzLT1rR6.exe.3dab980.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.5011aea.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.501af49.16.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4dafe3a.15.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4d9b80d.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.nzCzLT1rR6.exe.4d8f5d9.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000012.00000002.333728253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.540954705.0000000006970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.347590788.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.269552215.0000000003C6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.341628042.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.343896374.0000000003BE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: nzCzLT1rR6.exe PID: 6004, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: nzCzLT1rR6.exe PID: 1216, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: nzCzLT1rR6.exe PID: 5908, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2108, type: MEMORYSTR
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Windows Management Instrumentation
1
Scheduled Task/Job
112
Process Injection
2
Masquerading
21
Input Capture
1
System Time Discovery
Remote Services21
Input Capture
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts2
Command and Scripting Interpreter
Boot or Logon Initialization Scripts1
Scheduled Task/Job
1
Disable or Modify Tools
LSASS Memory221
Security Software Discovery
Remote Desktop Protocol11
Archive Collected Data
Exfiltration Over Bluetooth1
Non-Standard Port
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain Accounts1
Scheduled Task/Job
Logon Script (Windows)Logon Script (Windows)21
Virtualization/Sandbox Evasion
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Remote Access Software
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
Process Injection
NTDS21
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureScheduled Transfer1
Non-Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets1
Application Window Discovery
SSHKeyloggingData Transfer Size Limits21
Application Layer Protocol
Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
Hidden Files and Directories
Cached Domain Credentials13
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup Items3
Obfuscated Files or Information
DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job13
Software Packing
Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 795911 Sample: nzCzLT1rR6.exe Startdate: 01/02/2023 Architecture: WINDOWS Score: 100 48 tzitziklishop.ddns.net 2->48 52 Snort IDS alert for network traffic 2->52 54 Multi AV Scanner detection for domain / URL 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 15 other signatures 2->58 9 nzCzLT1rR6.exe 3 2->9         started        13 dhcpmon.exe 2 2->13         started        15 dhcpmon.exe 3 2->15         started        17 nzCzLT1rR6.exe 2 2->17         started        signatures3 process4 file5 46 C:\Users\user\AppData\...\nzCzLT1rR6.exe.log, ASCII 9->46 dropped 62 Uses schtasks.exe or at.exe to add and modify task schedules 9->62 64 Injects a PE file into a foreign processes 9->64 19 nzCzLT1rR6.exe 1 15 9->19         started        24 dhcpmon.exe 13->24         started        26 dhcpmon.exe 15->26         started        28 nzCzLT1rR6.exe 2 17->28         started        signatures6 process7 dnsIp8 50 tzitziklishop.ddns.net 45.12.253.26, 1665, 49698, 49699 CMCSUS Germany 19->50 38 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->38 dropped 40 C:\Users\user\AppData\Roaming\...\run.dat, data 19->40 dropped 42 C:\Users\user\AppData\Local\...\tmp9373.tmp, XML 19->42 dropped 44 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 19->44 dropped 60 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->60 30 schtasks.exe 1 19->30         started        32 schtasks.exe 1 19->32         started        file9 signatures10 process11 process12 34 conhost.exe 30->34         started        36 conhost.exe 32->36         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
nzCzLT1rR6.exe28%ReversingLabs
nzCzLT1rR6.exe30%VirustotalBrowse
nzCzLT1rR6.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe28%ReversingLabs
SourceDetectionScannerLabelLinkDownload
18.2.nzCzLT1rR6.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
1.2.nzCzLT1rR6.exe.6970000.24.unpack100%AviraTR/NanoCore.fadteDownload File
SourceDetectionScannerLabelLink
tzitziklishop.ddns.net12%VirustotalBrowse
SourceDetectionScannerLabelLink
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.tiro.com0%URL Reputationsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe
127.0.0.10%Avira URL Cloudsafe
127.0.0.12%VirustotalBrowse
tzitziklishop.ddns.net12%VirustotalBrowse
tzitziklishop.ddns.net100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
tzitziklishop.ddns.net
45.12.253.26
truetrueunknown
NameMaliciousAntivirus DetectionReputation
tzitziklishop.ddns.nettrue
  • 12%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
127.0.0.1true
  • 2%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://www.apache.org/licenses/LICENSE-2.0nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    http://www.fontbureau.comnzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.fontbureau.com/designersGnzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.fontbureau.com/designers/?nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.founder.com.cn/cn/bThenzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com/designers?nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.tiro.comnzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designersnzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.goodfont.co.krnzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://google.comnzCzLT1rR6.exe, 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.542851502.0000000007780000.00000004.08000000.00040000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, nzCzLT1rR6.exe, 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.carterandcone.comlnzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.sajatypeworks.comnzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.typography.netDnzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers/cabarga.htmlNnzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/cThenzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.galapagosdesign.com/staff/dennis.htmnzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://fontfabrik.comnzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.founder.com.cn/cnnzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/frere-jones.htmlnzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.jiyu-kobo.co.jp/nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/DPleasenzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers8nzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fonts.comnzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.sandoll.co.krnzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.urwpp.deDPleasenzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.zhongyicts.com.cnnzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namenzCzLT1rR6.exe, 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.sakkal.comnzCzLT1rR6.exe, 00000000.00000002.277951780.0000000006BB2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          45.12.253.26
                          tzitziklishop.ddns.netGermany
                          33657CMCSUStrue
                          Joe Sandbox Version:36.0.0 Rainbow Opal
                          Analysis ID:795911
                          Start date and time:2023-02-01 13:16:10 +01:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 10m 29s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:23
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample file name:nzCzLT1rR6.exe
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@18/11@15/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 98%
                          • Number of executed functions: 102
                          • Number of non-executed functions: 6
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                          • Excluded domains from analysis (whitelisted): fs.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtDeviceIoControlFile calls found.
                          TimeTypeDescription
                          13:17:11API Interceptor894x Sleep call for process: nzCzLT1rR6.exe modified
                          13:17:15Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\nzCzLT1rR6.exe" s>$(Arg0)
                          13:17:16AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          13:17:17Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                          13:17:27API Interceptor2x Sleep call for process: dhcpmon.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          45.12.253.26wvkLXKZ8u4.exeGet hashmaliciousBrowse
                            tM2hiDXHII.exeGet hashmaliciousBrowse
                              ugg75Xp5Ly.exeGet hashmaliciousBrowse
                                jkbRdmvpYk.exeGet hashmaliciousBrowse
                                  97J0yOg7xE.exeGet hashmaliciousBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    tzitziklishop.ddns.netwvkLXKZ8u4.exeGet hashmaliciousBrowse
                                    • 45.12.253.26
                                    tM2hiDXHII.exeGet hashmaliciousBrowse
                                    • 45.12.253.26
                                    ugg75Xp5Ly.exeGet hashmaliciousBrowse
                                    • 45.12.253.26
                                    jkbRdmvpYk.exeGet hashmaliciousBrowse
                                    • 45.12.253.26
                                    97J0yOg7xE.exeGet hashmaliciousBrowse
                                    • 45.12.253.26
                                    9xfmAn7tia.exeGet hashmaliciousBrowse
                                    • 194.180.48.197
                                    AZTEEjjb81.exeGet hashmaliciousBrowse
                                    • 194.180.48.197
                                    dsTz6BOMBc.exeGet hashmaliciousBrowse
                                    • 194.180.48.197
                                    l1yIVNqWbL.exeGet hashmaliciousBrowse
                                    • 194.180.48.197
                                    PAPp2Htw2l.exeGet hashmaliciousBrowse
                                    • 194.180.48.197
                                    fn84Sa6oxP.exeGet hashmaliciousBrowse
                                    • 194.180.48.197
                                    1rCwiABNIs.exeGet hashmaliciousBrowse
                                    • 194.180.48.197
                                    2XFxeuktGo.exeGet hashmaliciousBrowse
                                    • 194.180.48.197
                                    2OBeC7PLQA.exeGet hashmaliciousBrowse
                                    • 194.180.48.197
                                    5HypDdgylj.exeGet hashmaliciousBrowse
                                    • 194.180.48.197
                                    file.exeGet hashmaliciousBrowse
                                    • 194.180.48.197
                                    T1M66eTV7y.exeGet hashmaliciousBrowse
                                    • 194.180.48.197
                                    S55Ni1gsyy.exeGet hashmaliciousBrowse
                                    • 41.216.183.170
                                    6FlVlW0FE3.exeGet hashmaliciousBrowse
                                    • 41.216.183.170
                                    CJr1bWKt3v.exeGet hashmaliciousBrowse
                                    • 41.216.183.170
                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    CMCSUSfile.exeGet hashmaliciousBrowse
                                    • 45.12.253.56
                                    file.exeGet hashmaliciousBrowse
                                    • 45.12.253.56
                                    file.exeGet hashmaliciousBrowse
                                    • 45.12.253.56
                                    ATTACHMENT5678.xlsxGet hashmaliciousBrowse
                                    • 85.208.136.4
                                    file.exeGet hashmaliciousBrowse
                                    • 45.12.253.56
                                    file.exeGet hashmaliciousBrowse
                                    • 45.12.253.56
                                    file.exeGet hashmaliciousBrowse
                                    • 45.12.253.56
                                    file.exeGet hashmaliciousBrowse
                                    • 45.12.253.56
                                    file.exeGet hashmaliciousBrowse
                                    • 45.12.253.56
                                    file.exeGet hashmaliciousBrowse
                                    • 45.12.253.56
                                    file.exeGet hashmaliciousBrowse
                                    • 45.12.253.56
                                    file.exeGet hashmaliciousBrowse
                                    • 45.12.253.56
                                    file.exeGet hashmaliciousBrowse
                                    • 45.12.253.56
                                    file.exeGet hashmaliciousBrowse
                                    • 45.12.253.56
                                    file.exeGet hashmaliciousBrowse
                                    • 45.12.253.56
                                    file.exeGet hashmaliciousBrowse
                                    • 45.12.253.56
                                    file.exeGet hashmaliciousBrowse
                                    • 45.12.253.56
                                    file.exeGet hashmaliciousBrowse
                                    • 45.12.253.56
                                    file.exeGet hashmaliciousBrowse
                                    • 45.12.253.56
                                    file.exeGet hashmaliciousBrowse
                                    • 45.12.253.56
                                    No context
                                    No context
                                    Process:C:\Users\user\Desktop\nzCzLT1rR6.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):856064
                                    Entropy (8bit):7.392672284816359
                                    Encrypted:false
                                    SSDEEP:24576:peia1r8NO9c1xqpB9cbOEx54w6RTc4N34HZ:ps1r8M9WmzcbOEbKE
                                    MD5:2A4D85FB030591CBFA42BBC72F27607E
                                    SHA1:701232EDAF6AA4A36509644D69B6A7C55443B1B6
                                    SHA-256:D7DC5A4583F409639BF8C10EB62FBBC13AC2E1B8F702425E959D47E64463D45F
                                    SHA-512:4E17DEF1C104C95BC784B58DD0B1445050D3489225F27C60EC0253AF302F44E04DA25C3743606865F85D1940A4EF3B90ED50D58B98ED0A0CCC21A39366A4A4E8
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 28%
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....5.c..............0......(........... ........@.. .......................@............@.....................................O............................ ..........T............................................ ............... ..H............text...T.... ...................... ..`.rsrc............ ..................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\nzCzLT1rR6.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):26
                                    Entropy (8bit):3.95006375643621
                                    Encrypted:false
                                    SSDEEP:3:ggPYV:rPYV
                                    MD5:187F488E27DB4AF347237FE461A079AD
                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview:[ZoneTransfer]....ZoneId=0
                                    Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1216
                                    Entropy (8bit):5.355304211458859
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                    MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                    SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                    SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                    SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                    Malicious:false
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                    Process:C:\Users\user\Desktop\nzCzLT1rR6.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1216
                                    Entropy (8bit):5.355304211458859
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                    MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                    SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                    SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                    SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                    Malicious:true
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                    Process:C:\Users\user\Desktop\nzCzLT1rR6.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1300
                                    Entropy (8bit):5.1134186573278635
                                    Encrypted:false
                                    SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK02xtn:cbk4oL600QydbQxIYODOLedq3Bj
                                    MD5:EA0A9B3D723EFB29247BFCC232623350
                                    SHA1:2B2A2216A879A594F446C62A7DF5BBAE40EA2F34
                                    SHA-256:D35E198665E7BB3750E00F867B7579075720D38926062CB7362E1E912FE29B54
                                    SHA-512:81D5AFA7D63D0D6B8754A029B2D6FCF4E854CDC295B84E4B56AEEFB9643FFC157CA1C2C4B73813C67788FC2FD9DA2CE0A6AAD17A65AEC4482A5D21D9C7146484
                                    Malicious:true
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                    Process:C:\Users\user\Desktop\nzCzLT1rR6.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1310
                                    Entropy (8bit):5.109425792877704
                                    Encrypted:false
                                    SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                    MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                    SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                    SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                    SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                    Process:C:\Users\user\Desktop\nzCzLT1rR6.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):232
                                    Entropy (8bit):7.024371743172393
                                    Encrypted:false
                                    SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                                    MD5:32D0AAE13696FF7F8AF33B2D22451028
                                    SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                                    SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                                    SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                                    Malicious:false
                                    Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                                    Process:C:\Users\user\Desktop\nzCzLT1rR6.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):8
                                    Entropy (8bit):3.0
                                    Encrypted:false
                                    SSDEEP:3:l+t:lS
                                    MD5:22308B91A420C8005645AD61D0EFA476
                                    SHA1:E4D0F227DA23E59AAF838155C79B4BF60BCA6A70
                                    SHA-256:22A68CB21E4FA5445DEAC968EC01AED2305C1C629C076275F963BFE393512C43
                                    SHA-512:9222A796A7E7C6E9410D7DDE631159E4D9228079273A364D7432B79EE4E04934BBD7FFCC79BFAEAE2C5E104AEE95A24180D7FA03C3ED73C2F8C67553CE5C1D68
                                    Malicious:true
                                    Preview:......H
                                    Process:C:\Users\user\Desktop\nzCzLT1rR6.exe
                                    File Type:data
                                    Category:modified
                                    Size (bytes):40
                                    Entropy (8bit):5.221928094887364
                                    Encrypted:false
                                    SSDEEP:3:9bzY6oRDMjmPl:RzWDMCd
                                    MD5:AE0F5E6CE7122AF264EC533C6B15A27B
                                    SHA1:1265A495C42EED76CC043D50C60C23297E76CCE1
                                    SHA-256:73B0B92179C61C26589B47E9732CE418B07EDEE3860EE5A2A5FB06F3B8AA9B26
                                    SHA-512:DD44C2D24D4E3A0F0B988AD3D04683B5CB128298043134649BBE33B2512CE0C9B1A8E7D893B9F66FBBCDD901E2B0646C4533FB6C0C8C4AFCB95A0EFB95D446F8
                                    Malicious:false
                                    Preview:9iH...}Z.4..f..... 8.j....|.&X..e.F.*.
                                    Process:C:\Users\user\Desktop\nzCzLT1rR6.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):327432
                                    Entropy (8bit):7.99938831605763
                                    Encrypted:true
                                    SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                                    MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                                    SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                                    SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                                    SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                                    Malicious:false
                                    Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                                    Process:C:\Users\user\Desktop\nzCzLT1rR6.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):37
                                    Entropy (8bit):4.337435460048129
                                    Encrypted:false
                                    SSDEEP:3:oNWXp5vLcx5Cn:oNWXpFscn
                                    MD5:EAF8F534247E1E2C45FE31206C50AF6E
                                    SHA1:2C7FD6E43C9F8F9A1E81BF028A97D25A2E146228
                                    SHA-256:F52465571F68F951E008AADCB47E29588FEAF9BB4D0E5941F8A6322BBB224243
                                    SHA-512:A4D98BACF3DF8D0348274C9ECC8BE155EEA58AE635300929C4F7E08B2A2FC782674A0C9C1A03BAEB015513E94CFCC267BE0C1B0D2FF9EFA937AA1057EE7DE685
                                    Malicious:false
                                    Preview:C:\Users\user\Desktop\nzCzLT1rR6.exe
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.392672284816359
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                    File name:nzCzLT1rR6.exe
                                    File size:856064
                                    MD5:2a4d85fb030591cbfa42bbc72f27607e
                                    SHA1:701232edaf6aa4a36509644d69b6a7c55443b1b6
                                    SHA256:d7dc5a4583f409639bf8c10eb62fbbc13ac2e1b8f702425e959d47e64463d45f
                                    SHA512:4e17def1c104c95bc784b58dd0b1445050d3489225f27c60ec0253af302f44e04da25c3743606865f85d1940a4ef3b90ed50d58b98ed0a0ccc21a39366a4a4e8
                                    SSDEEP:24576:peia1r8NO9c1xqpB9cbOEx54w6RTc4N34HZ:ps1r8M9WmzcbOEbKE
                                    TLSH:40056A8137B15862F1DB05B91028778C1E3D7443A6E6E2665BBB39C49703AF7F298F12
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....5.c..............0......(........... ........@.. .......................@............@................................
                                    Icon Hash:821de22b2b661982
                                    Entrypoint:0x4cfb0e
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x63DA35FD [Wed Feb 1 09:50:53 2023 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add dword ptr [eax], eax
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add dword ptr [eax], eax
                                    add byte ptr [eax], al
                                    add dword ptr [eax], eax
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add dword ptr [eax], eax
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add dword ptr [eax], eax
                                    add byte ptr [eax], al
                                    add dword ptr [eax], eax
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add dword ptr [eax], eax
                                    add byte ptr [eax], al
                                    add dword ptr [eax], eax
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add dword ptr [eax], eax
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add dword ptr [eax], eax
                                    add byte ptr [eax], al
                                    add dword ptr [eax], eax
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add dword ptr [eax], eax
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xcfabc0x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xd00000x1904.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xd20000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xcbeb00x54.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xcdc540xce000False0.7378640776699029data7.413609935503911IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0xd00000x19040x2000False0.6446533203125data6.110407966825619IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0xd20000xc0x800False0.015625data0.02939680787012526IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountry
                                    RT_ICON0xd01000x1296PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                    RT_GROUP_ICON0xd13a80x14data
                                    RT_VERSION0xd13cc0x338data
                                    RT_MANIFEST0xd17140x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                    192.168.2.345.12.253.264970216652816766 02/01/23-13:18:00.977494TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497021665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264969816652816766 02/01/23-13:17:24.114380TCP2816766ETPRO TROJAN NanoCore RAT CnC 7496981665192.168.2.345.12.253.26
                                    45.12.253.26192.168.2.31665496982841753 02/01/23-13:17:23.356204TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)16654969845.12.253.26192.168.2.3
                                    192.168.2.345.12.253.264970016652025019 02/01/23-13:17:38.752931TCP2025019ET TROJAN Possible NanoCore C2 60B497001665192.168.2.345.12.253.26
                                    45.12.253.26192.168.2.31665497002841753 02/01/23-13:17:43.786170TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)16654970045.12.253.26192.168.2.3
                                    192.168.2.345.12.253.264971016652025019 02/01/23-13:18:53.106687TCP2025019ET TROJAN Possible NanoCore C2 60B497101665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264970116652816718 02/01/23-13:17:51.941680TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497011665192.168.2.345.12.253.26
                                    45.12.253.26192.168.2.31665497012810290 02/01/23-13:17:50.835717TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 116654970145.12.253.26192.168.2.3
                                    192.168.2.345.12.253.264970916652816766 02/01/23-13:18:47.985288TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497091665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264970416652025019 02/01/23-13:18:12.511200TCP2025019ET TROJAN Possible NanoCore C2 60B497041665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264970516652816766 02/01/23-13:18:21.103350TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497051665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264971116652816766 02/01/23-13:19:05.431254TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497111665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264969916652025019 02/01/23-13:17:29.785359TCP2025019ET TROJAN Possible NanoCore C2 60B496991665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264971016652816718 02/01/23-13:18:54.276262TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497101665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264970716652025019 02/01/23-13:18:33.167648TCP2025019ET TROJAN Possible NanoCore C2 60B497071665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264970616652816766 02/01/23-13:18:27.570835TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497061665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264970316652025019 02/01/23-13:18:06.200920TCP2025019ET TROJAN Possible NanoCore C2 60B497031665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264969816652025019 02/01/23-13:17:18.638360TCP2025019ET TROJAN Possible NanoCore C2 60B496981665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264970916652025019 02/01/23-13:18:47.017681TCP2025019ET TROJAN Possible NanoCore C2 60B497091665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264971216652025019 02/01/23-13:19:24.159023TCP2025019ET TROJAN Possible NanoCore C2 60B497121665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264970616652025019 02/01/23-13:18:26.207894TCP2025019ET TROJAN Possible NanoCore C2 60B497061665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264970316652816766 02/01/23-13:18:07.370216TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497031665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264970716652816766 02/01/23-13:18:34.782616TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497071665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264970216652025019 02/01/23-13:17:57.465792TCP2025019ET TROJAN Possible NanoCore C2 60B497021665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264970816652816766 02/01/23-13:18:41.773314TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497081665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264970116652816766 02/01/23-13:17:51.941680TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497011665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264970816652025019 02/01/23-13:18:40.027997TCP2025019ET TROJAN Possible NanoCore C2 60B497081665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264969916652816766 02/01/23-13:17:30.963105TCP2816766ETPRO TROJAN NanoCore RAT CnC 7496991665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264970016652816766 02/01/23-13:17:43.841016TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497001665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264971116652025019 02/01/23-13:19:04.505055TCP2025019ET TROJAN Possible NanoCore C2 60B497111665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264970516652025019 02/01/23-13:18:20.346491TCP2025019ET TROJAN Possible NanoCore C2 60B497051665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264970116652025019 02/01/23-13:17:50.278538TCP2025019ET TROJAN Possible NanoCore C2 60B497011665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264970416652816766 02/01/23-13:18:13.411136TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497041665192.168.2.345.12.253.26
                                    192.168.2.345.12.253.264971016652816766 02/01/23-13:18:55.458400TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497101665192.168.2.345.12.253.26
                                    TimestampSource PortDest PortSource IPDest IP
                                    Feb 1, 2023 13:17:18.288016081 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:18.314538002 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:18.314672947 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:18.638360023 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:18.723278999 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:18.791244030 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:18.838916063 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:18.869852066 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:18.964178085 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:18.966751099 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.051708937 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.051852942 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.134402990 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.219264984 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.219301939 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.219322920 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.219341993 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.219381094 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.219430923 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.246212959 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.246263027 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.246283054 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.246303082 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.246323109 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.246340990 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.246354103 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.246364117 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.246383905 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.246423960 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.246464014 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.272747993 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.273128986 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.273154974 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.273175001 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.273195028 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.273202896 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.273216009 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.273237944 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.273257971 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.273258924 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.273278952 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.273298979 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.273309946 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.273319960 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.273339987 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.273343086 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.273360968 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.273380995 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.273396015 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.273401976 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.273433924 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.299825907 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.299870968 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.299891949 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.299900055 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.299912930 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.299932957 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.299940109 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.299954891 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.299973965 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.299990892 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.299995899 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300019026 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300038099 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300045013 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.300060034 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300080061 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300081968 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.300101042 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300105095 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.300122023 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300141096 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300144911 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.300159931 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300179958 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300194025 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.300199986 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300219059 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300223112 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.300240040 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300260067 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300262928 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.300281048 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300299883 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300304890 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.300319910 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300343990 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.300487995 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300508022 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300542116 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300543070 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.300576925 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.300580025 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.330279112 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330310106 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330327988 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330336094 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.330349922 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330370903 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330374002 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.330390930 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330411911 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330414057 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.330435038 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330446005 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.330457926 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330476999 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330491066 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.330497980 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330519915 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330530882 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.330540895 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330560923 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330573082 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.330581903 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330602884 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330614090 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.330624104 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330643892 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330656052 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.330665112 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330684900 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330698967 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.330723047 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330743074 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330761909 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330768108 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.330784082 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330796957 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.330805063 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330823898 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330838919 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.330847979 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330868959 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330883026 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.330888987 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330909967 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330920935 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.330929995 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330950022 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330967903 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.330972910 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.330988884 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.331010103 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.331012964 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.331031084 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.331051111 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.331053972 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.331070900 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.331085920 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.331091881 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.331111908 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.331125975 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.331132889 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.331152916 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.331165075 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.331173897 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.331193924 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.331208944 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.331214905 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.331234932 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.331248999 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.331255913 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.331276894 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.331295013 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.331300020 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.331336021 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.360661983 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.360698938 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.360739946 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.360759974 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.360780001 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.360801935 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.360800982 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.360825062 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.360851049 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.360852003 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.360873938 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.360894918 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.360898018 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.360915899 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.360935926 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.360940933 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.360958099 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.360977888 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.360996962 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361001015 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.361018896 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361022949 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.361042023 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361061096 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361078978 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361088037 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.361100912 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361104012 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.361123085 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361143112 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361145973 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.361162901 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361182928 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361202002 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361207008 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.361222982 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361227989 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.361243963 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361263037 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361267090 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.361284971 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361304045 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361321926 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361329079 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.361344099 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361346960 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.361366034 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361386061 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361404896 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361409903 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.361426115 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361428976 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.361447096 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361466885 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361485958 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361490965 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.361505985 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361511946 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.361526966 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361545086 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361563921 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361571074 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.361584902 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361588001 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.361607075 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361627102 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361645937 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361648083 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.361666918 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361670971 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.361686945 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361707926 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.361730099 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.361754894 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.390321970 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390381098 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390402079 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390415907 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390429974 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390449047 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390463114 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390485048 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390506983 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390527010 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390547037 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390568018 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390582085 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390594006 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.390600920 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390621901 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390644073 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.390645027 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390666008 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390686035 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.390686035 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390722990 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.390727997 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390750885 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390769958 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390789986 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.390791893 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390811920 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390827894 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.390832901 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390853882 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390856981 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.390873909 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390893936 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390896082 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.390914917 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390935898 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.390935898 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390959024 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.390976906 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.390979052 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391000032 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391016960 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.391021013 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391042948 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391063929 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391066074 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.391083956 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391104937 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391105890 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.391124964 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391144037 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.391145945 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391169071 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391187906 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391207933 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391220093 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.391221046 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.391227961 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391248941 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391268969 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391277075 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.391289949 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391304970 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.391310930 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391331911 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391335011 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.391354084 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391375065 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.391386032 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.391426086 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.417802095 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.417845964 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.417874098 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.417900085 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.417922974 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.417926073 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.417952061 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.417958975 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.417979002 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.417998075 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.418004990 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418031931 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418044090 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.418056965 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418081045 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418112040 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418132067 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.418138027 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418160915 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.418163061 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418188095 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418211937 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418230057 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.418236017 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418255091 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.418261051 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418286085 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418309927 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418334007 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418339014 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.418359041 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418365002 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.418385029 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418409109 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418425083 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.418435097 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418447971 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.418459892 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418498993 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418534994 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418543100 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.418566942 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418575048 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.418601036 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418632984 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418664932 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418673992 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.418720961 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.418732882 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418766022 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418797016 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418828964 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418843985 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.418860912 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418868065 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.418895006 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418926954 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418958902 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418971062 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.418991089 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.418999910 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.419028044 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419060946 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419092894 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419106960 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.419126034 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419136047 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.419159889 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419192076 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419224024 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419239998 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.419255972 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419264078 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.419289112 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419321060 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419352055 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419373035 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.419384003 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419404030 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.419415951 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419449091 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419480085 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419492006 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.419511080 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419522047 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.419543982 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419575930 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419605970 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419617891 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.419639111 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419647932 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.419672012 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419704914 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419737101 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419749975 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.419769049 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419779062 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.419800997 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419831991 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419863939 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419878006 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.419897079 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419909000 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.419929981 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419961929 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.419994116 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.420003891 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.420027018 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.420034885 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:19.420059919 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.420090914 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:19.420150042 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:23.356204033 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:23.547234058 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:24.042169094 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:24.114320993 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:24.114379883 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:24.191997051 CET16654969845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:25.339215040 CET496981665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:29.750391960 CET496991665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:29.777246952 CET16654969945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:29.777401924 CET496991665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:29.785358906 CET496991665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:29.866816998 CET16654969945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:29.906044006 CET16654969945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:30.016504049 CET496991665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:30.150711060 CET496991665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:30.178631067 CET16654969945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:30.188754082 CET496991665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:30.271806955 CET16654969945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:30.403592110 CET16654969945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:30.516547918 CET496991665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:30.543243885 CET16654969945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:30.617758989 CET496991665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:30.963104963 CET496991665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:30.997821093 CET16654969945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:31.219727039 CET496991665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:31.685564041 CET496991665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:31.770901918 CET16654969945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:31.825715065 CET496991665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:31.826896906 CET496991665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:31.854257107 CET16654969945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:31.857917070 CET496991665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:38.721966982 CET497001665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:38.748358011 CET16654970045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:38.748478889 CET497001665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:38.752931118 CET497001665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:38.848328114 CET16654970045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:38.865668058 CET16654970045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:38.866220951 CET497001665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:38.894248962 CET16654970045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:38.922959089 CET497001665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:39.005120993 CET16654970045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:39.142812967 CET16654970045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:39.145426035 CET497001665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:39.172032118 CET16654970045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:39.361067057 CET497001665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:39.390383005 CET16654970045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:39.526050091 CET497001665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:39.553177118 CET16654970045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:39.554910898 CET497001665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:39.582736969 CET16654970045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:39.610100031 CET497001665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:39.693489075 CET16654970045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:39.721434116 CET497001665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:39.801467896 CET16654970045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:39.802503109 CET497001665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:39.879631042 CET16654970045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:39.881901979 CET497001665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:39.959863901 CET16654970045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:40.000757933 CET16654970045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:40.048578024 CET497001665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:42.043373108 CET497001665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:42.113990068 CET16654970045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:42.213655949 CET497001665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:42.301850080 CET16654970045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:43.786170006 CET16654970045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:43.841016054 CET497001665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:43.911663055 CET16654970045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:44.965451002 CET497001665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:50.249833107 CET497011665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:50.276760101 CET16654970145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:50.278140068 CET497011665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:50.278537989 CET497011665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:50.364527941 CET16654970145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:50.402367115 CET16654970145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:50.402573109 CET497011665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:50.430115938 CET16654970145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:50.437251091 CET497011665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:50.520335913 CET16654970145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:50.774168015 CET16654970145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:50.774858952 CET497011665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:50.803037882 CET16654970145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:50.803714037 CET497011665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:50.835716963 CET16654970145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:50.835922956 CET497011665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:50.875498056 CET16654970145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:50.875607967 CET497011665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:50.958502054 CET16654970145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:50.958673000 CET497011665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:51.035969973 CET16654970145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:51.941679955 CET497011665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:52.021536112 CET16654970145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:52.940908909 CET497011665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:57.299578905 CET497021665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:57.330823898 CET16654970245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:57.331496000 CET497021665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:57.465791941 CET497021665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:57.554337025 CET16654970245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:57.773684025 CET16654970245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:57.815768003 CET497021665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:57.947695017 CET497021665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:57.975291967 CET16654970245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:58.018826008 CET497021665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:58.496021032 CET497021665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:58.585844994 CET16654970245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:58.801172018 CET16654970245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:58.925204039 CET497021665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:58.952116013 CET16654970245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:59.112724066 CET497021665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:59.447818041 CET497021665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:59.536650896 CET16654970245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:59.536832094 CET497021665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:59.565505981 CET16654970245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:59.565608025 CET497021665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:59.597590923 CET16654970245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:17:59.597718000 CET497021665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:17:59.678992987 CET16654970245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:00.977494001 CET497021665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:01.067138910 CET16654970245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:02.055939913 CET497021665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:06.173453093 CET497031665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:06.200336933 CET16654970345.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:06.200463057 CET497031665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:06.200920105 CET497031665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:06.286155939 CET16654970345.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:06.286328077 CET497031665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:06.365715027 CET16654970345.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:06.380958080 CET16654970345.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:06.411453009 CET497031665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:06.438927889 CET16654970345.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:06.598541021 CET497031665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:06.676605940 CET16654970345.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:06.806154013 CET16654970345.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:06.853462934 CET497031665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:06.884435892 CET16654970345.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:07.129060984 CET497031665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:07.158819914 CET16654970345.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:07.160594940 CET497031665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:07.187549114 CET16654970345.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:07.189183950 CET497031665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:07.216322899 CET16654970345.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:07.288474083 CET497031665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:07.370073080 CET16654970345.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:07.370215893 CET497031665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:07.442559004 CET16654970345.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:08.353553057 CET497031665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:12.408368111 CET497041665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:12.435641050 CET16654970445.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:12.435787916 CET497041665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:12.511199951 CET497041665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:12.601999998 CET16654970445.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:12.671474934 CET16654970445.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:12.723258972 CET497041665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:12.746367931 CET497041665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:12.773765087 CET16654970445.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:12.787197113 CET497041665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:12.863873959 CET16654970445.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:13.102022886 CET16654970445.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:13.106549025 CET497041665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:13.133954048 CET16654970445.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:13.192045927 CET497041665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:13.218616962 CET16654970445.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:13.270189047 CET497041665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:13.411135912 CET497041665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:13.489118099 CET16654970445.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:13.637270927 CET16654970445.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:13.692043066 CET497041665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:13.718574047 CET16654970445.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:13.770236015 CET497041665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:13.809295893 CET497041665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:13.837351084 CET16654970445.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:13.837486029 CET497041665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:13.864456892 CET16654970445.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:13.864530087 CET497041665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:13.954065084 CET16654970445.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:14.395864010 CET497041665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:20.259958029 CET497051665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:20.288866997 CET16654970545.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:20.289074898 CET497051665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:20.346491098 CET497051665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:20.427263975 CET16654970545.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:20.443058968 CET16654970545.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:20.452495098 CET497051665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:20.482501984 CET16654970545.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:20.490869999 CET497051665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:20.582431078 CET16654970545.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:20.698542118 CET16654970545.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:20.786396027 CET497051665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:20.805701971 CET497051665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:20.814068079 CET16654970545.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:20.898204088 CET16654970545.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:20.989557981 CET497051665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:21.043065071 CET16654970545.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:21.043309927 CET497051665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:21.076699972 CET16654970545.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:21.076833010 CET497051665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:21.103266954 CET16654970545.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:21.103349924 CET497051665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:21.192107916 CET16654970545.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:21.299829006 CET16654970545.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:21.489562988 CET497051665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:22.126451969 CET497051665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:26.173913956 CET497061665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:26.203121901 CET16654970645.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:26.207071066 CET497061665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:26.207894087 CET497061665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:26.286592960 CET16654970645.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:26.324752092 CET16654970645.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:26.331213951 CET497061665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:26.359149933 CET16654970645.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:26.382235050 CET497061665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:26.474375010 CET16654970645.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:26.621047020 CET497061665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:26.692454100 CET16654970645.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:26.698821068 CET16654970645.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:26.699841022 CET497061665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:26.726361990 CET16654970645.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:26.727159977 CET497061665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:26.754223108 CET16654970645.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:26.754544973 CET497061665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:26.781486034 CET16654970645.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:26.849364042 CET497061665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:27.570835114 CET497061665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:27.661056042 CET16654970645.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:28.587263107 CET497061665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:33.140017986 CET497071665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:33.166970968 CET16654970745.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:33.167176962 CET497071665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:33.167648077 CET497071665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:33.259373903 CET16654970745.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:33.300791979 CET16654970745.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:33.310734987 CET497071665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:33.345025063 CET16654970745.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:33.354266882 CET497071665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:33.434123993 CET16654970745.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:33.556552887 CET16654970745.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:33.557697058 CET497071665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:33.584811926 CET16654970745.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:33.631211996 CET497071665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:33.671698093 CET16654970745.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:33.699179888 CET497071665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:33.725960970 CET16654970745.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:33.726396084 CET497071665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:33.753695965 CET16654970745.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:33.753948927 CET497071665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:33.781450987 CET16654970745.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:33.807153940 CET497071665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:33.895435095 CET16654970745.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:34.782615900 CET497071665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:34.870316982 CET16654970745.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:35.956042051 CET497071665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:40.000471115 CET497081665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:40.027411938 CET16654970845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:40.027554989 CET497081665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:40.027997017 CET497081665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:40.113934994 CET16654970845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:40.168606997 CET16654970845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:40.210702896 CET497081665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:40.239485979 CET16654970845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:40.317816019 CET497081665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:40.401107073 CET16654970845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:40.576277018 CET16654970845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:40.647452116 CET497081665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:40.662898064 CET497081665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:40.673831940 CET16654970845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:40.754554033 CET16654970845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:40.850569010 CET497081665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:40.877731085 CET16654970845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:40.922152042 CET497081665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:40.949457884 CET16654970845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:40.949527979 CET497081665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:40.980439901 CET16654970845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:40.980521917 CET497081665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:41.052017927 CET16654970845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:41.624187946 CET497081665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:41.707921028 CET16654970845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:41.773313999 CET497081665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:41.851001978 CET16654970845.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:42.820036888 CET497081665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:46.981514931 CET497091665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:47.008265018 CET16654970945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:47.012810946 CET497091665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:47.017680883 CET497091665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:47.098927975 CET16654970945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:47.200337887 CET16654970945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:47.203507900 CET497091665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:47.251688004 CET16654970945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:47.270703077 CET497091665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:47.358093023 CET16654970945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:47.605623960 CET16654970945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:47.606276989 CET497091665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:47.634109020 CET16654970945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:47.635179043 CET497091665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:47.664700985 CET16654970945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:47.664904118 CET497091665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:47.720108032 CET16654970945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:47.773232937 CET497091665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:47.985287905 CET497091665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:48.085438967 CET16654970945.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:48.945588112 CET497091665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:53.007397890 CET497101665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:53.034965992 CET16654971045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:53.035126925 CET497101665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:53.106687069 CET497101665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:53.192580938 CET16654971045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:53.213601112 CET16654971045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:53.215676069 CET497101665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:53.250231028 CET16654971045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:53.253375053 CET497101665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:53.333268881 CET16654971045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:53.337280989 CET497101665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:53.426425934 CET16654971045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:53.587167978 CET16654971045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:53.588558912 CET497101665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:53.622262955 CET16654971045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:53.664367914 CET497101665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:53.986458063 CET16654971045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:54.039244890 CET497101665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:54.066253901 CET16654971045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:54.066483021 CET497101665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:54.094201088 CET16654971045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:54.094611883 CET497101665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:54.122602940 CET16654971045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:54.164258957 CET497101665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:54.276262045 CET497101665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:54.374202013 CET16654971045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:55.458400011 CET497101665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:18:55.552840948 CET16654971045.12.253.26192.168.2.3
                                    Feb 1, 2023 13:18:57.180686951 CET497101665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:01.464890957 CET497111665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:04.477523088 CET497111665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:04.504539013 CET16654971145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:04.504646063 CET497111665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:04.505054951 CET497111665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:04.542736053 CET16654971145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:04.688733101 CET16654971145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:04.689460039 CET497111665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:04.716176987 CET16654971145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:04.727441072 CET497111665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:04.770133972 CET16654971145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:04.918121099 CET16654971145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:04.923618078 CET497111665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:04.950165987 CET16654971145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:04.993314981 CET497111665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:05.055933952 CET16654971145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:05.102580070 CET497111665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:05.129034996 CET16654971145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:05.180697918 CET497111665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:05.352791071 CET497111665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:05.381783009 CET16654971145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:05.382530928 CET497111665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:05.409642935 CET16654971145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:05.431253910 CET497111665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:05.473357916 CET16654971145.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:06.433392048 CET497111665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:24.128416061 CET497121665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:24.156692982 CET16654971245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:24.156847954 CET497121665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:24.159023046 CET497121665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:24.241199970 CET16654971245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:24.307981968 CET16654971245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:24.310252905 CET497121665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:24.337105036 CET16654971245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:24.340610981 CET497121665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:24.418267965 CET16654971245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:24.582525015 CET16654971245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:24.583267927 CET497121665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:24.618247032 CET16654971245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:24.666821957 CET497121665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:24.737324953 CET16654971245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:24.754677057 CET497121665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:24.781402111 CET16654971245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:24.781596899 CET497121665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:24.808193922 CET16654971245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:24.808339119 CET497121665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:24.843988895 CET16654971245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:24.885641098 CET497121665192.168.2.345.12.253.26
                                    Feb 1, 2023 13:19:27.402534962 CET16654971245.12.253.26192.168.2.3
                                    Feb 1, 2023 13:19:27.448553085 CET497121665192.168.2.345.12.253.26
                                    TimestampSource PortDest PortSource IPDest IP
                                    Feb 1, 2023 13:17:18.230256081 CET6270453192.168.2.38.8.8.8
                                    Feb 1, 2023 13:17:18.249610901 CET53627048.8.8.8192.168.2.3
                                    Feb 1, 2023 13:17:29.726079941 CET4997753192.168.2.38.8.8.8
                                    Feb 1, 2023 13:17:29.747073889 CET53499778.8.8.8192.168.2.3
                                    Feb 1, 2023 13:17:38.681685925 CET5784053192.168.2.38.8.8.8
                                    Feb 1, 2023 13:17:38.699248075 CET53578408.8.8.8192.168.2.3
                                    Feb 1, 2023 13:17:50.227096081 CET5799053192.168.2.38.8.8.8
                                    Feb 1, 2023 13:17:50.248939037 CET53579908.8.8.8192.168.2.3
                                    Feb 1, 2023 13:17:57.084634066 CET5238753192.168.2.38.8.8.8
                                    Feb 1, 2023 13:17:57.106492043 CET53523878.8.8.8192.168.2.3
                                    Feb 1, 2023 13:18:06.151191950 CET5692453192.168.2.38.8.8.8
                                    Feb 1, 2023 13:18:06.172343969 CET53569248.8.8.8192.168.2.3
                                    Feb 1, 2023 13:18:12.388278008 CET6062553192.168.2.38.8.8.8
                                    Feb 1, 2023 13:18:12.405318022 CET53606258.8.8.8192.168.2.3
                                    Feb 1, 2023 13:18:20.170303106 CET4930253192.168.2.38.8.8.8
                                    Feb 1, 2023 13:18:20.192081928 CET53493028.8.8.8192.168.2.3
                                    Feb 1, 2023 13:18:26.153378010 CET5397553192.168.2.38.8.8.8
                                    Feb 1, 2023 13:18:26.172627926 CET53539758.8.8.8192.168.2.3
                                    Feb 1, 2023 13:18:33.111686945 CET5113953192.168.2.38.8.8.8
                                    Feb 1, 2023 13:18:33.131355047 CET53511398.8.8.8192.168.2.3
                                    Feb 1, 2023 13:18:39.978817940 CET5295553192.168.2.38.8.8.8
                                    Feb 1, 2023 13:18:39.998919964 CET53529558.8.8.8192.168.2.3
                                    Feb 1, 2023 13:18:46.957595110 CET6058253192.168.2.38.8.8.8
                                    Feb 1, 2023 13:18:46.976948977 CET53605828.8.8.8192.168.2.3
                                    Feb 1, 2023 13:18:52.987720966 CET5713453192.168.2.38.8.8.8
                                    Feb 1, 2023 13:18:53.006586075 CET53571348.8.8.8192.168.2.3
                                    Feb 1, 2023 13:19:01.442071915 CET6205053192.168.2.38.8.8.8
                                    Feb 1, 2023 13:19:01.463848114 CET53620508.8.8.8192.168.2.3
                                    Feb 1, 2023 13:19:24.105247021 CET5604253192.168.2.38.8.8.8
                                    Feb 1, 2023 13:19:24.127202988 CET53560428.8.8.8192.168.2.3
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Feb 1, 2023 13:17:18.230256081 CET192.168.2.38.8.8.80x6d87Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:17:29.726079941 CET192.168.2.38.8.8.80x7808Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:17:38.681685925 CET192.168.2.38.8.8.80xf922Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:17:50.227096081 CET192.168.2.38.8.8.80x329dStandard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:17:57.084634066 CET192.168.2.38.8.8.80x6528Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:18:06.151191950 CET192.168.2.38.8.8.80x3deaStandard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:18:12.388278008 CET192.168.2.38.8.8.80x3ac6Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:18:20.170303106 CET192.168.2.38.8.8.80x7fbdStandard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:18:26.153378010 CET192.168.2.38.8.8.80xbf46Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:18:33.111686945 CET192.168.2.38.8.8.80x8d01Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:18:39.978817940 CET192.168.2.38.8.8.80x4935Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:18:46.957595110 CET192.168.2.38.8.8.80xcb3Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:18:52.987720966 CET192.168.2.38.8.8.80x1672Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:19:01.442071915 CET192.168.2.38.8.8.80xa7f2Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:19:24.105247021 CET192.168.2.38.8.8.80xf687Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Feb 1, 2023 13:17:18.249610901 CET8.8.8.8192.168.2.30x6d87No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:17:29.747073889 CET8.8.8.8192.168.2.30x7808No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:17:38.699248075 CET8.8.8.8192.168.2.30xf922No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:17:50.248939037 CET8.8.8.8192.168.2.30x329dNo error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:17:57.106492043 CET8.8.8.8192.168.2.30x6528No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:18:06.172343969 CET8.8.8.8192.168.2.30x3deaNo error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:18:12.405318022 CET8.8.8.8192.168.2.30x3ac6No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:18:20.192081928 CET8.8.8.8192.168.2.30x7fbdNo error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:18:26.172627926 CET8.8.8.8192.168.2.30xbf46No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:18:33.131355047 CET8.8.8.8192.168.2.30x8d01No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:18:39.998919964 CET8.8.8.8192.168.2.30x4935No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:18:46.976948977 CET8.8.8.8192.168.2.30xcb3No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:18:53.006586075 CET8.8.8.8192.168.2.30x1672No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:19:01.463848114 CET8.8.8.8192.168.2.30xa7f2No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 13:19:24.127202988 CET8.8.8.8192.168.2.30xf687No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:13:17:05
                                    Start date:01/02/2023
                                    Path:C:\Users\user\Desktop\nzCzLT1rR6.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\nzCzLT1rR6.exe
                                    Imagebase:0x770000
                                    File size:856064 bytes
                                    MD5 hash:2A4D85FB030591CBFA42BBC72F27607E
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.269552215.0000000003C6C000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.269552215.0000000003C6C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.269552215.0000000003C6C000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.269552215.0000000003C6C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.267300740.0000000002C64000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low

                                    Target ID:1
                                    Start time:13:17:12
                                    Start date:01/02/2023
                                    Path:C:\Users\user\Desktop\nzCzLT1rR6.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\nzCzLT1rR6.exe
                                    Imagebase:0xf60000
                                    File size:856064 bytes
                                    MD5 hash:2A4D85FB030591CBFA42BBC72F27607E
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.543241972.00000000077C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.543241972.00000000077C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.543241972.00000000077C0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.543241972.00000000077C0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.543793463.0000000007950000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.543793463.0000000007950000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.543793463.0000000007950000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.543793463.0000000007950000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.543011972.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.543011972.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.543011972.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.543011972.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.540605869.00000000066F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.540605869.00000000066F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.540605869.00000000066F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.540605869.00000000066F0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.539921982.0000000005E40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.539921982.0000000005E40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.539921982.0000000005E40000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.539921982.0000000005E40000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.540271148.00000000066B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.540271148.00000000066B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.540271148.00000000066B0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.540271148.00000000066B0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.542851502.0000000007780000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.542851502.0000000007780000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.542851502.0000000007780000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.542851502.0000000007780000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.540954705.0000000006970000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.540954705.0000000006970000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.540954705.0000000006970000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.540954705.0000000006970000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.540954705.0000000006970000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.540194138.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.540194138.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.540194138.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.540194138.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000003.287933444.0000000006D26000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.530717785.0000000005011000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.542239209.0000000006E20000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.542239209.0000000006E20000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.542239209.0000000006E20000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.542239209.0000000006E20000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.540666148.0000000006700000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.540666148.0000000006700000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.540666148.0000000006700000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.540666148.0000000006700000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.530717785.0000000004EB0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.542942575.0000000007790000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.542942575.0000000007790000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.542942575.0000000007790000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.542942575.0000000007790000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.540745789.0000000006710000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.540745789.0000000006710000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.540745789.0000000006710000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.540745789.0000000006710000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.530717785.0000000004CE0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.530717785.0000000004F26000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.521288702.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.543341019.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.543341019.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.543341019.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.543341019.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    Reputation:low

                                    Target ID:2
                                    Start time:13:17:14
                                    Start date:01/02/2023
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp9373.tmp
                                    Imagebase:0x1260000
                                    File size:185856 bytes
                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:3
                                    Start time:13:17:14
                                    Start date:01/02/2023
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff745070000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:4
                                    Start time:13:17:15
                                    Start date:01/02/2023
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp9539.tmp
                                    Imagebase:0x1260000
                                    File size:185856 bytes
                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:5
                                    Start time:13:17:15
                                    Start date:01/02/2023
                                    Path:C:\Users\user\Desktop\nzCzLT1rR6.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\nzCzLT1rR6.exe 0
                                    Imagebase:0x3d0000
                                    File size:856064 bytes
                                    MD5 hash:2A4D85FB030591CBFA42BBC72F27607E
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:low

                                    Target ID:6
                                    Start time:13:17:15
                                    Start date:01/02/2023
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff745070000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:7
                                    Start time:13:17:17
                                    Start date:01/02/2023
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                                    Imagebase:0x490000
                                    File size:856064 bytes
                                    MD5 hash:2A4D85FB030591CBFA42BBC72F27607E
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000007.00000002.313319799.00000000029F4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Antivirus matches:
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 28%, ReversingLabs
                                    Reputation:low

                                    Target ID:10
                                    Start time:13:17:24
                                    Start date:01/02/2023
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                    Imagebase:0x950000
                                    File size:856064 bytes
                                    MD5 hash:2A4D85FB030591CBFA42BBC72F27607E
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:low

                                    Target ID:18
                                    Start time:13:17:28
                                    Start date:01/02/2023
                                    Path:C:\Users\user\Desktop\nzCzLT1rR6.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\nzCzLT1rR6.exe
                                    Imagebase:0x840000
                                    File size:856064 bytes
                                    MD5 hash:2A4D85FB030591CBFA42BBC72F27607E
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.333728253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.333728253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.333728253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000012.00000002.333728253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.341628042.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.341628042.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000012.00000002.341628042.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.343896374.0000000003BE9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.343896374.0000000003BE9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000012.00000002.343896374.0000000003BE9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    Reputation:low

                                    Target ID:19
                                    Start time:13:17:32
                                    Start date:01/02/2023
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Imagebase:0xd50000
                                    File size:856064 bytes
                                    MD5 hash:2A4D85FB030591CBFA42BBC72F27607E
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.347590788.0000000003231000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.347590788.0000000003231000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.347590788.0000000003231000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    Reputation:low

                                    Target ID:20
                                    Start time:13:17:42
                                    Start date:01/02/2023
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Imagebase:0xd20000
                                    File size:856064 bytes
                                    MD5 hash:2A4D85FB030591CBFA42BBC72F27607E
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:low

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:11.5%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:107
                                      Total number of Limit Nodes:7
                                      execution_graph 15510 7607af0 15511 7607b38 WriteProcessMemory 15510->15511 15513 7607b8f 15511->15513 15601 7607a00 15602 7607a40 VirtualAllocEx 15601->15602 15604 7607a7d 15602->15604 15613 7607c10 15614 7607c5b ReadProcessMemory 15613->15614 15616 7607c9f 15614->15616 15504 106c200 DuplicateHandle 15505 106c296 15504->15505 15514 10640d0 15515 10640e2 15514->15515 15516 10640ee 15515->15516 15520 10641e0 15515->15520 15525 1063868 15516->15525 15518 106410d 15521 1064205 15520->15521 15529 10642e0 15521->15529 15533 10642d1 15521->15533 15526 1063873 15525->15526 15541 1065b48 15526->15541 15528 1066ece 15528->15518 15530 1064307 15529->15530 15532 10643e4 15530->15532 15537 10638a8 15530->15537 15534 1064307 15533->15534 15535 10643e4 15534->15535 15536 10638a8 CreateActCtxA 15534->15536 15536->15535 15538 1065370 CreateActCtxA 15537->15538 15540 1065433 15538->15540 15542 1065b53 15541->15542 15545 1066a88 15542->15545 15544 106710d 15544->15528 15546 1066a93 15545->15546 15549 1066ab8 15546->15549 15548 10671e2 15548->15544 15550 1066ac3 15549->15550 15553 1066ae8 15550->15553 15552 10672e2 15552->15548 15555 1066af3 15553->15555 15554 1067a3c 15554->15552 15555->15554 15557 106b8f9 15555->15557 15558 106b929 15557->15558 15559 106b94d 15558->15559 15562 106bab8 15558->15562 15566 106baa9 15558->15566 15559->15554 15564 106bac5 15562->15564 15563 106baff 15563->15559 15564->15563 15570 106a5fc 15564->15570 15567 106bac5 15566->15567 15568 106baff 15567->15568 15569 106a5fc 2 API calls 15567->15569 15568->15559 15569->15568 15571 106a607 15570->15571 15573 106c7f8 15571->15573 15574 106be0c 15571->15574 15573->15573 15575 106be17 15574->15575 15576 1066ae8 2 API calls 15575->15576 15577 106c867 15575->15577 15576->15577 15581 106e5f0 15577->15581 15587 106e5d8 15577->15587 15578 106c8a0 15578->15573 15583 106e66d 15581->15583 15584 106e621 15581->15584 15582 106e62d 15582->15578 15583->15578 15584->15582 15585 106ea60 LoadLibraryExW GetModuleHandleW 15584->15585 15586 106ea70 LoadLibraryExW GetModuleHandleW 15584->15586 15585->15583 15586->15583 15589 106e621 15587->15589 15590 106e66d 15587->15590 15588 106e62d 15588->15578 15589->15588 15591 106ea60 LoadLibraryExW GetModuleHandleW 15589->15591 15592 106ea70 LoadLibraryExW GetModuleHandleW 15589->15592 15590->15578 15591->15590 15592->15590 15593 106bbd0 GetCurrentProcess 15594 106bc4a GetCurrentThread 15593->15594 15596 106bc43 15593->15596 15595 106bc87 GetCurrentProcess 15594->15595 15597 106bc80 15594->15597 15600 106bcbd 15595->15600 15596->15594 15597->15595 15598 106bce5 GetCurrentThreadId 15599 106bd16 15598->15599 15600->15598 15617 10697f0 15620 10698e8 15617->15620 15618 10697ff 15621 10698fb 15620->15621 15622 1069913 15621->15622 15628 1069b70 15621->15628 15632 1069b61 15621->15632 15622->15618 15623 106990b 15623->15622 15624 1069b10 GetModuleHandleW 15623->15624 15625 1069b3d 15624->15625 15625->15618 15629 1069b84 15628->15629 15630 1069ba9 15629->15630 15636 1068c80 15629->15636 15630->15623 15633 1069b84 15632->15633 15634 1068c80 LoadLibraryExW 15633->15634 15635 1069ba9 15633->15635 15634->15635 15635->15623 15637 1069d50 LoadLibraryExW 15636->15637 15639 1069dc9 15637->15639 15639->15630 15506 7607868 15507 76078ad SetThreadContext 15506->15507 15509 76078f5 15507->15509 15605 7607e08 15606 7607e91 CreateProcessA 15605->15606 15608 7608053 15606->15608 15609 7607788 15610 76077c8 ResumeThread 15609->15610 15612 76077f9 15610->15612

                                      Control-flow Graph

                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 0106BC30
                                      • GetCurrentThread.KERNEL32 ref: 0106BC6D
                                      • GetCurrentProcess.KERNEL32 ref: 0106BCAA
                                      • GetCurrentThreadId.KERNEL32 ref: 0106BD03
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266798309.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1060000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: ef9a425dbf2dd22f5b96697406a01cadeafc114425259cf2f5a72fa9d281b62e
                                      • Instruction ID: 1c8b321b84bb57c021d5e511ddad0fd75dd40e5422f4c2d81949cb72f9b6b941
                                      • Opcode Fuzzy Hash: ef9a425dbf2dd22f5b96697406a01cadeafc114425259cf2f5a72fa9d281b62e
                                      • Instruction Fuzzy Hash: 6D5189B4A002498FDB54CFA9CA487DEBFF5FF48314F20845AE049A7250DB789985CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 0106BC30
                                      • GetCurrentThread.KERNEL32 ref: 0106BC6D
                                      • GetCurrentProcess.KERNEL32 ref: 0106BCAA
                                      • GetCurrentThreadId.KERNEL32 ref: 0106BD03
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266798309.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1060000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: 98efb9255c45064e1dd5715390a07634afa653b7edf85b4556e21196f920082f
                                      • Instruction ID: 4f36f8e9a07648840e1c93d3579f8e38f76655fc7077eddef7c7815e9f290c5a
                                      • Opcode Fuzzy Hash: 98efb9255c45064e1dd5715390a07634afa653b7edf85b4556e21196f920082f
                                      • Instruction Fuzzy Hash: 665165B4A002098FDB54CFAADA4879EBFF5BB48314F208459E049A7250DB789984CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 42 7607e08-7607e9d 44 7607ed6-7607ef6 42->44 45 7607e9f-7607ea9 42->45 50 7607ef8-7607f02 44->50 51 7607f2f-7607f5e 44->51 45->44 46 7607eab-7607ead 45->46 48 7607ed0-7607ed3 46->48 49 7607eaf-7607eb9 46->49 48->44 52 7607ebb 49->52 53 7607ebd-7607ecc 49->53 50->51 55 7607f04-7607f06 50->55 59 7607f60-7607f6a 51->59 60 7607f97-7608051 CreateProcessA 51->60 52->53 53->53 54 7607ece 53->54 54->48 56 7607f08-7607f12 55->56 57 7607f29-7607f2c 55->57 61 7607f14 56->61 62 7607f16-7607f25 56->62 57->51 59->60 63 7607f6c-7607f6e 59->63 73 7608053-7608059 60->73 74 760805a-76080e0 60->74 61->62 62->62 64 7607f27 62->64 65 7607f70-7607f7a 63->65 66 7607f91-7607f94 63->66 64->57 68 7607f7c 65->68 69 7607f7e-7607f8d 65->69 66->60 68->69 69->69 70 7607f8f 69->70 70->66 73->74 84 76080f0-76080f4 74->84 85 76080e2-76080e6 74->85 87 7608104-7608108 84->87 88 76080f6-76080fa 84->88 85->84 86 76080e8 85->86 86->84 90 7608118-760811c 87->90 91 760810a-760810e 87->91 88->87 89 76080fc 88->89 89->87 93 760812e-7608135 90->93 94 760811e-7608124 90->94 91->90 92 7608110 91->92 92->90 95 7608137-7608146 93->95 96 760814c 93->96 94->93 95->96
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0760803E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.292864438.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7600000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 02bb6976ca95a3c3db3ca10e5181e3f4ecaa3ab16f3fbbb1a7744a1d4da77783
                                      • Instruction ID: 8242ea53752203711764a90edbc7903878ee04fd7eb066fe46986d502bb9dcfb
                                      • Opcode Fuzzy Hash: 02bb6976ca95a3c3db3ca10e5181e3f4ecaa3ab16f3fbbb1a7744a1d4da77783
                                      • Instruction Fuzzy Hash: 5F913CB1D0021ADFDF24CF69C8817DEBBB2BF48314F1485A9D81AA7280DB759985CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 98 10698e8-10698fd call 1068c1c 101 1069913-1069917 98->101 102 10698ff 98->102 103 106992b-106996c 101->103 104 1069919-1069923 101->104 153 1069905 call 1069b70 102->153 154 1069905 call 1069b61 102->154 109 106996e-1069976 103->109 110 1069979-1069987 103->110 104->103 105 106990b-106990d 105->101 106 1069a48-1069b08 105->106 146 1069b10-1069b3b GetModuleHandleW 106->146 147 1069b0a-1069b0d 106->147 109->110 112 10699ab-10699ad 110->112 113 1069989-106998e 110->113 114 10699b0-10699b7 112->114 115 1069990-1069997 call 1068c28 113->115 116 1069999 113->116 118 10699c4-10699cb 114->118 119 10699b9-10699c1 114->119 117 106999b-10699a9 115->117 116->117 117->114 122 10699cd-10699d5 118->122 123 10699d8-10699e1 call 1068c38 118->123 119->118 122->123 128 10699e3-10699eb 123->128 129 10699ee-10699f3 123->129 128->129 131 10699f5-10699fc 129->131 132 1069a11-1069a15 129->132 131->132 134 10699fe-1069a0e call 1068c48 call 1068c58 131->134 151 1069a18 call 1069e68 132->151 152 1069a18 call 1069e59 132->152 134->132 135 1069a1b-1069a1e 138 1069a20-1069a3e 135->138 139 1069a41-1069a47 135->139 138->139 148 1069b44-1069b58 146->148 149 1069b3d-1069b43 146->149 147->146 149->148 151->135 152->135 153->105 154->105
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 01069B2E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266798309.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1060000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 3301ea247ab1a449dfa929aa1260356bce70153719dfa9d9a21b30ef09f1c6c8
                                      • Instruction ID: 6209cbec14bce6a60fcab33074bfe944678eacdf5317074e9acf02911123be6b
                                      • Opcode Fuzzy Hash: 3301ea247ab1a449dfa929aa1260356bce70153719dfa9d9a21b30ef09f1c6c8
                                      • Instruction Fuzzy Hash: 0D712670A00B068FD764DF2AD45079ABBF5FF88214F10892ED48AD7A50DB35E845CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 155 1065364-1065431 CreateActCtxA 157 1065433-1065439 155->157 158 106543a-1065494 155->158 157->158 165 1065496-1065499 158->165 166 10654a3-10654a7 158->166 165->166 167 10654b8 166->167 168 10654a9-10654b5 166->168 170 10654b9 167->170 168->167 170->170
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 01065421
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266798309.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1060000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: be04f067be62becc3d37a64e3efb2a8f6ba58d26b5207cc6ff825ec35f2169aa
                                      • Instruction ID: 41a8f3050d1d1ebb559dff7799adf7c075085c1c71f4217576f0739871a56e50
                                      • Opcode Fuzzy Hash: be04f067be62becc3d37a64e3efb2a8f6ba58d26b5207cc6ff825ec35f2169aa
                                      • Instruction Fuzzy Hash: 1B41F270D00218CEDB24DFA9C884BDEBBF5BF48309F248099D459AB255DB75A986CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 171 10638a8-1065431 CreateActCtxA 174 1065433-1065439 171->174 175 106543a-1065494 171->175 174->175 182 1065496-1065499 175->182 183 10654a3-10654a7 175->183 182->183 184 10654b8 183->184 185 10654a9-10654b5 183->185 187 10654b9 184->187 185->184 187->187
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 01065421
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266798309.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1060000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 501b06f4b66cecd737282c194adbb3fcdc45c8b5645ed543c6c40323e15768fc
                                      • Instruction ID: 17c51a665d773b20899cb58fdb002fd838d114c6905f1f892d9f2bb75ea60e51
                                      • Opcode Fuzzy Hash: 501b06f4b66cecd737282c194adbb3fcdc45c8b5645ed543c6c40323e15768fc
                                      • Instruction Fuzzy Hash: 6D41E471D00318CBDB24DFAAC94478EBBF9BF48309F248099D419AB255DB75A985CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 188 7607af0-7607b3e 190 7607b40-7607b4c 188->190 191 7607b4e-7607b8d WriteProcessMemory 188->191 190->191 193 7607b96-7607bc6 191->193 194 7607b8f-7607b95 191->194 194->193
                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07607B80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.292864438.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7600000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: 843e807c62ad6d6aa77d4ff6a8f481071cb8733865ba06c87bedfcfb23143d86
                                      • Instruction ID: 5a584074d25d348f7ccbcda1eeda699ffdec668d7704563e701ad976ecb6dbdc
                                      • Opcode Fuzzy Hash: 843e807c62ad6d6aa77d4ff6a8f481071cb8733865ba06c87bedfcfb23143d86
                                      • Instruction Fuzzy Hash: 1E2127B59003099FCF10CFAAC884BDEBBF5FF48314F548429E959A7280C778A944CBA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 203 7607868-76078b3 205 76078c3-76078f3 SetThreadContext 203->205 206 76078b5-76078c1 203->206 208 76078f5-76078fb 205->208 209 76078fc-760792c 205->209 206->205 208->209
                                      APIs
                                      • SetThreadContext.KERNELBASE(?,00000000), ref: 076078E6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.292864438.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7600000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: ContextThread
                                      • String ID:
                                      • API String ID: 1591575202-0
                                      • Opcode ID: 2918f18170fe2e25c5866dee834502eb117f65244373d53611694ed578de8350
                                      • Instruction ID: f9b9b7bb93e3886d71ab9492f95778a04997fd88d573ba1b9d3a8e7c97c093dd
                                      • Opcode Fuzzy Hash: 2918f18170fe2e25c5866dee834502eb117f65244373d53611694ed578de8350
                                      • Instruction Fuzzy Hash: 222137B5D003098FCB14DFAAC8847AFBBF5EF48364F548429D459A7280DB78A945CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 213 7607c10-7607c9d ReadProcessMemory 216 7607ca6-7607cd6 213->216 217 7607c9f-7607ca5 213->217 217->216
                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07607C90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.292864438.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7600000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: 895f288c4f9e9f572a3e7231198188ee6daa37e28bdd98615b13424380cbd754
                                      • Instruction ID: abbf20ae950e2976039754cdb63688ed9846b1cae4a0df7994020538df38e5ee
                                      • Opcode Fuzzy Hash: 895f288c4f9e9f572a3e7231198188ee6daa37e28bdd98615b13424380cbd754
                                      • Instruction Fuzzy Hash: 2B2116B59002099FCB10CFAAC884ADEBBF5FF48324F548429E559A7240D779A944CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 198 106c1f8-106c294 DuplicateHandle 199 106c296-106c29c 198->199 200 106c29d-106c2ba 198->200 199->200
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0106C287
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266798309.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1060000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 729e4789b8891947f3fa8e30a249bf2bca5cc75f190eb39c19c8d320ed99985c
                                      • Instruction ID: bdfb9b70bc048ac592bcaced41f4eaf34138c9e8edf5fcad452153ad2361c31b
                                      • Opcode Fuzzy Hash: 729e4789b8891947f3fa8e30a249bf2bca5cc75f190eb39c19c8d320ed99985c
                                      • Instruction Fuzzy Hash: 332116B5D012099FDB10CFAAD984AEEBFF5FB08310F14841AE854A3350C378A954CFA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 221 106c200-106c294 DuplicateHandle 222 106c296-106c29c 221->222 223 106c29d-106c2ba 221->223 222->223
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0106C287
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266798309.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1060000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: fedd94456e585fa52ff15f7d2d7693f49c22b56fa8d1bd23512116d9b91beb30
                                      • Instruction ID: 865f32b38740bfb25df5a405c5b02339f39ff57e55a6a4cfcfc959bd8a182d26
                                      • Opcode Fuzzy Hash: fedd94456e585fa52ff15f7d2d7693f49c22b56fa8d1bd23512116d9b91beb30
                                      • Instruction Fuzzy Hash: 2421F8B59002099FDB10CF9AD984ADEFFF9FB48314F14841AE954A3350C378A954CFA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 226 1068c80-1069d90 228 1069d92-1069d95 226->228 229 1069d98-1069dc7 LoadLibraryExW 226->229 228->229 230 1069dd0-1069ded 229->230 231 1069dc9-1069dcf 229->231 231->230
                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01069BA9,00000800,00000000,00000000), ref: 01069DBA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266798309.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1060000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: c6ed7b037ee439ed8d66bed209ac82b598947efa2ceb852fd988eddf73a95075
                                      • Instruction ID: 8fc186fa5870c88cb7616948e117f26eb451aa2ce6b84511ab92514024e6f55b
                                      • Opcode Fuzzy Hash: c6ed7b037ee439ed8d66bed209ac82b598947efa2ceb852fd988eddf73a95075
                                      • Instruction Fuzzy Hash: 981147B68002088FDB10DF9AD444ADEFBF9EB58314F10842EE555B7600C379A545CFA4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 235 1069d49-1069d90 236 1069d92-1069d95 235->236 237 1069d98-1069dc7 LoadLibraryExW 235->237 236->237 238 1069dd0-1069ded 237->238 239 1069dc9-1069dcf 237->239 239->238
                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01069BA9,00000800,00000000,00000000), ref: 01069DBA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266798309.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1060000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 10309483df96b083c76a448d45dcd36872798c8065d0fd20b7be44b81eb5a651
                                      • Instruction ID: 27001926dcc9edd370e27df85d06cdc8c07ef977a91880aa56941bd29c264683
                                      • Opcode Fuzzy Hash: 10309483df96b083c76a448d45dcd36872798c8065d0fd20b7be44b81eb5a651
                                      • Instruction Fuzzy Hash: 831147B68002488FDB10CFAAD484ADEFFF5AB98314F14842ED455B7600C375A545CFA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 243 7607a00-7607a7b VirtualAllocEx 246 7607a84-7607aa9 243->246 247 7607a7d-7607a83 243->247 247->246
                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07607A6E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.292864438.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7600000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 00bec5ab5c4361e2e5f0c461917abd6147892a7cb3f76d38ff7596a35e8fea3a
                                      • Instruction ID: 11940612523f14dfb40834be13a0cf52dc85cc02133f728280265a2bc3ea0550
                                      • Opcode Fuzzy Hash: 00bec5ab5c4361e2e5f0c461917abd6147892a7cb3f76d38ff7596a35e8fea3a
                                      • Instruction Fuzzy Hash: 2F1167759002499FCF10CFAAC8446DFBFF6EF88324F148819E425A7250C779A950CFA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 251 7607788-76077f7 ResumeThread 254 7607800-7607825 251->254 255 76077f9-76077ff 251->255 255->254
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.292864438.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7600000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: 9ec49e8f3801b33b89fa4f79b2a73135da6fc007104ab66339e37df1794741aa
                                      • Instruction ID: 8463a00b948b2fdeef46bd12de37b1bbf53f1aa3979b30da800ef2254ac20732
                                      • Opcode Fuzzy Hash: 9ec49e8f3801b33b89fa4f79b2a73135da6fc007104ab66339e37df1794741aa
                                      • Instruction Fuzzy Hash: 7B1128B59002098BCB14DFAAD8447DFFBF5AF88324F248829D415A7240CB79A944CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 01069B2E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266798309.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1060000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 119fcaea49cb20688220a2fdbd342212486772b6af1b382a334b1f653bd2e12b
                                      • Instruction ID: fa669f6c95647e75eacf00517214d9e5c61589e92480fa74ae628f72383b6f4e
                                      • Opcode Fuzzy Hash: 119fcaea49cb20688220a2fdbd342212486772b6af1b382a334b1f653bd2e12b
                                      • Instruction Fuzzy Hash: F81113B5C002098FDB10CF9AD944BDEFBF8AF88328F10845AD459A7600C379A545CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266640158.000000000100D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_100d000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 42d31944e493a4b90b583452f021100a58c679f1f85c59857b8b2b11499b3127
                                      • Instruction ID: 7324d370f8b0896af9426f0f5fd2fd135ff63a707668a4c64f777802b92e2e5f
                                      • Opcode Fuzzy Hash: 42d31944e493a4b90b583452f021100a58c679f1f85c59857b8b2b11499b3127
                                      • Instruction Fuzzy Hash: C7213875500244DFEB02CF98C9C0B5ABFA5FB84324F24C5A9E8450B286C736E446C7B2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266669925.000000000101D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0101D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_101d000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cb75d2cf8a777e76990f7f68adf458172a033b7039a1ca766691f63251e01d26
                                      • Instruction ID: a887572c1102453fee4bacbf620b8b10c1fa35412bc048640f87f87a8658b3f1
                                      • Opcode Fuzzy Hash: cb75d2cf8a777e76990f7f68adf458172a033b7039a1ca766691f63251e01d26
                                      • Instruction Fuzzy Hash: 9D214975504240EFDB02CF58D9C4B56BBA5FB94324F24C6ADE8894B24AC33ED846CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266669925.000000000101D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0101D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_101d000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f25531b3c8652508ba7fc63dcfdbe5c9ef5c5e3d940218a72492a58db65cf5f5
                                      • Instruction ID: 0f52f50f94b5c77b3c9750436aaeb70108b7fe876f802cb19a34eb3eb0155f9c
                                      • Opcode Fuzzy Hash: f25531b3c8652508ba7fc63dcfdbe5c9ef5c5e3d940218a72492a58db65cf5f5
                                      • Instruction Fuzzy Hash: CB212575604240DFDB16CF58D9C8B16BBA5FB84354F24C9ADE8894B24AC33FD846CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266640158.000000000100D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_100d000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4e78fb41457c0dbc2d9524af8796639b843feda46be7989836c0fd150c2e2370
                                      • Instruction ID: 80ce7079fe0e98cfcbc97e986750e254ca421c28c47915ee8626ebfaa23666e3
                                      • Opcode Fuzzy Hash: 4e78fb41457c0dbc2d9524af8796639b843feda46be7989836c0fd150c2e2370
                                      • Instruction Fuzzy Hash: 2B11B176504280DFDB12CF58D9C4B56BFB1FB84324F28C6A9D8490B656C33AE456CBA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266669925.000000000101D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0101D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_101d000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a40b480d4fa50119ebda35aff352db3dffa7348ebbf36f966237d5faf07d1e9
                                      • Instruction ID: e1669c71cb2732a38aee3cfa526cba05e9de5779e2b1102e96e56e14293474a8
                                      • Opcode Fuzzy Hash: 4a40b480d4fa50119ebda35aff352db3dffa7348ebbf36f966237d5faf07d1e9
                                      • Instruction Fuzzy Hash: 7F119075504280DFDB12CF58D5C4B15FFA1FB84314F28C6AEE8894B65AC33AD44ACB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266669925.000000000101D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0101D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_101d000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a40b480d4fa50119ebda35aff352db3dffa7348ebbf36f966237d5faf07d1e9
                                      • Instruction ID: 041cd5f94cea1e653cfc2e4b71e24daa93d8f0a8e97d86c413e05c71c18fe606
                                      • Opcode Fuzzy Hash: 4a40b480d4fa50119ebda35aff352db3dffa7348ebbf36f966237d5faf07d1e9
                                      • Instruction Fuzzy Hash: F711BB76504280DFDB42CF58C9C4B55BBA1FB84224F28C6ADD8894B65AC33AD44ACB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266640158.000000000100D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_100d000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 549fd0f04d7038befa67384f93e3c96f82e4dd117a7d2fd380a9def404d4e81d
                                      • Instruction ID: 0796c970d97eaf1157b43e3d005719b289416d8ae42c932fe4e3a2ce92039ac8
                                      • Opcode Fuzzy Hash: 549fd0f04d7038befa67384f93e3c96f82e4dd117a7d2fd380a9def404d4e81d
                                      • Instruction Fuzzy Hash: 2601D8651043C49AF7624AAECC84B6BBFD8FB45274F08C55AE9491A2C6E3799440CB72
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266640158.000000000100D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_100d000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5851d19ce1f59a239d4a06644685d9743b394345366ce5d41daed92b1aaa97fd
                                      • Instruction ID: b2a715fd9e6033b8d8a54d3455aecfd5879897b065d4e792ad031f69930ca8c5
                                      • Opcode Fuzzy Hash: 5851d19ce1f59a239d4a06644685d9743b394345366ce5d41daed92b1aaa97fd
                                      • Instruction Fuzzy Hash: BAF0C2714042849AF7518E5ACC84B66FFD8EB81234F18C45AED481B2C6D3799844CBB2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.292864438.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7600000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: \
                                      • API String ID: 0-2967466578
                                      • Opcode ID: b15133d2004c03646dfe2ebf6a7c210f36d55dc3348db2b4a5c2fcc4d85889d2
                                      • Instruction ID: a5613fb4d0bbeb79718162431438e9b1ee9aa11096b8544a7d45115f3d7bfb9e
                                      • Opcode Fuzzy Hash: b15133d2004c03646dfe2ebf6a7c210f36d55dc3348db2b4a5c2fcc4d85889d2
                                      • Instruction Fuzzy Hash: 3A413EB1E01A18CBEB18CF6B8D4069BFAF7BFC9301F14C1BA840DAA255DB7019818E51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266798309.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1060000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e9f77ab159a0e6d1e3df1955ca6650b1ab8de2140647324a14cb43a9ad6a6656
                                      • Instruction ID: 7376edd1a96045f62d8b81c4062f214242a691497490cb937edd117eb983c216
                                      • Opcode Fuzzy Hash: e9f77ab159a0e6d1e3df1955ca6650b1ab8de2140647324a14cb43a9ad6a6656
                                      • Instruction Fuzzy Hash: 0812C2F5419B468AE330CF65EDD818DBBA1B755328F904208D2E12BAD9D7BE114ACF84
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266798309.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1060000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ec5ad69d4737562525fe68a28a6e34396f1c3668eb71d5c8333eedfdc9c2ba92
                                      • Instruction ID: 01e052173a21e9cbe17e665db3885e2c60c38f711e2cc871eb2fdb3647aee1c6
                                      • Opcode Fuzzy Hash: ec5ad69d4737562525fe68a28a6e34396f1c3668eb71d5c8333eedfdc9c2ba92
                                      • Instruction Fuzzy Hash: DBA17B36E0031ACFCF05DFA9C9445DEBBF6FF85300B1585AAE945AB265EB31A905CB40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.266798309.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1060000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ceeb1f1f094cdf864909428262d67e4b52a2eced9bf411288aacaafa421a1675
                                      • Instruction ID: da12f4bf836f61da50e2bdbdb2d4d61b0e6deb84ece174cd6fbd007a6d374a00
                                      • Opcode Fuzzy Hash: ceeb1f1f094cdf864909428262d67e4b52a2eced9bf411288aacaafa421a1675
                                      • Instruction Fuzzy Hash: 60C116B58197468AD720CF65EDD818DBBB1FB85328F504308D2E12BAD8D7BE1586CF84
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.292864438.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7600000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7ec69f503f598205ef22b276a117db17488153d9606bfa04f2fbccd0764111ad
                                      • Instruction ID: d8bb1f3e26e15242d6373bc597b90c423e4b7a5d77f23379441a8d769c7a0b5e
                                      • Opcode Fuzzy Hash: 7ec69f503f598205ef22b276a117db17488153d9606bfa04f2fbccd0764111ad
                                      • Instruction Fuzzy Hash: E241BFB1D056598FD71DCF6B8C4029AFBF3AFC9210F18C1B6C44CAA265EB3409868F11
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Execution Graph

                                      Execution Coverage:14.9%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:388
                                      Total number of Limit Nodes:30
                                      execution_graph 42373 7996b58 42374 7996b76 42373->42374 42377 7996734 42374->42377 42376 7996bad 42378 7998678 LoadLibraryA 42377->42378 42380 7998754 42378->42380 42381 6e32e20 42382 6e32e29 42381->42382 42386 6e32e60 42382->42386 42391 6e32e70 42382->42391 42383 6e32e5a 42387 6e32e70 42386->42387 42396 6e32e99 42387->42396 42401 6e32ea8 42387->42401 42388 6e32e8c 42388->42383 42392 6e32e75 42391->42392 42394 6e32e99 DnsQuery_A 42392->42394 42395 6e32ea8 DnsQuery_A 42392->42395 42393 6e32e8c 42393->42383 42394->42393 42395->42393 42398 6e32ec6 42396->42398 42397 6e32eee 42397->42388 42398->42397 42406 6e32fb0 42398->42406 42410 6e32fa0 42398->42410 42403 6e32ec6 42401->42403 42402 6e32eee 42402->42388 42403->42402 42404 6e32fa0 DnsQuery_A 42403->42404 42405 6e32fb0 DnsQuery_A 42403->42405 42404->42403 42405->42403 42407 6e32fd9 42406->42407 42414 6e31b54 42407->42414 42409 6e3301a 42409->42398 42411 6e32fb0 42410->42411 42412 6e31b54 DnsQuery_A 42411->42412 42413 6e3301a 42412->42413 42413->42398 42415 6e332c0 DnsQuery_A 42414->42415 42417 6e333fa 42415->42417 42417->42417 42418 19f6758 42421 19f6344 42418->42421 42420 19f6766 42422 19f634f 42421->42422 42425 19f6394 42422->42425 42424 19f688d 42424->42420 42426 19f639f 42425->42426 42429 19f63c4 42426->42429 42428 19f6962 42428->42424 42430 19f63cf 42429->42430 42433 19f63f4 42430->42433 42432 19f6a62 42432->42428 42435 19f63ff 42433->42435 42434 19f71bc 42434->42432 42435->42434 42437 19fb406 42435->42437 42438 19fb429 42437->42438 42439 19fb44d 42438->42439 42442 19fb5aa 42438->42442 42446 19fb5b8 42438->42446 42439->42434 42443 19fb5c5 42442->42443 42444 19fb5ff 42443->42444 42450 19fa0ec 42443->42450 42444->42439 42447 19fb5c5 42446->42447 42448 19fb5ff 42447->42448 42449 19fa0ec 6 API calls 42447->42449 42448->42439 42449->42448 42451 19fa0f7 42450->42451 42453 19fc2f8 42451->42453 42454 19fb904 42451->42454 42453->42453 42455 19fb90f 42454->42455 42456 19fc367 42455->42456 42457 19f63f4 6 API calls 42455->42457 42464 19fc3d1 42456->42464 42470 19fc3e0 42456->42470 42457->42456 42458 19fc375 42462 19fe0d8 LoadLibraryExW GetModuleHandleW CreateWindowExW 42458->42462 42463 19fe0f0 LoadLibraryExW GetModuleHandleW CreateWindowExW 42458->42463 42459 19fc3a0 42459->42453 42462->42459 42463->42459 42465 19fc3e0 42464->42465 42467 19fc437 42465->42467 42469 19fc4df 42465->42469 42476 19fb9a0 42465->42476 42468 19fc4da KiUserCallbackDispatcher 42467->42468 42467->42469 42468->42469 42471 19fc3e1 42470->42471 42472 19fb9a0 GetFocus 42471->42472 42473 19fc437 42471->42473 42475 19fc4df 42471->42475 42472->42473 42474 19fc4da KiUserCallbackDispatcher 42473->42474 42473->42475 42474->42475 42477 19fb9ab 42476->42477 42478 19fba14 GetFocus 42477->42478 42479 19fc9f5 42477->42479 42478->42479 42479->42467 42480 79952d0 42489 7993698 42480->42489 42483 7993698 GetCurrentThreadId 42484 79952ff 42483->42484 42485 7993698 GetCurrentThreadId 42484->42485 42486 7995337 42485->42486 42487 7993698 GetCurrentThreadId 42486->42487 42488 79953d6 42486->42488 42487->42488 42492 799369b 42489->42492 42490 7993e6f GetCurrentThreadId 42491 7993e5a 42490->42491 42491->42483 42491->42484 42492->42490 42492->42491 42783 7992823 42788 79930fb 42783->42788 42796 7993100 42783->42796 42804 7970de0 42783->42804 42784 7992836 42789 7993100 42788->42789 42791 7993698 GetCurrentThreadId 42789->42791 42809 79938c0 42789->42809 42813 7993470 42789->42813 42817 7993631 42789->42817 42821 799345f 42789->42821 42790 7993127 42790->42784 42791->42790 42797 7993110 42796->42797 42799 7993698 GetCurrentThreadId 42797->42799 42800 799345f GetCurrentThreadId 42797->42800 42801 7993631 GetCurrentThreadId 42797->42801 42802 7993470 GetCurrentThreadId 42797->42802 42803 79938c0 GetCurrentThreadId 42797->42803 42798 7993127 42798->42784 42799->42798 42800->42798 42801->42798 42802->42798 42803->42798 42805 7970de2 42804->42805 42825 7970e90 42805->42825 42830 7970e80 42805->42830 42806 7970e73 42806->42784 42812 79936d1 42809->42812 42810 7993e6f GetCurrentThreadId 42811 7993e5a 42810->42811 42811->42790 42812->42810 42812->42811 42816 7993471 42813->42816 42814 7993e6f GetCurrentThreadId 42815 79934a2 42814->42815 42815->42790 42816->42814 42816->42815 42820 79934b8 42817->42820 42818 7993e6f GetCurrentThreadId 42819 799350a 42818->42819 42819->42790 42820->42818 42820->42819 42822 7993464 42821->42822 42823 7993e6f GetCurrentThreadId 42822->42823 42824 79933ff 42822->42824 42823->42824 42824->42790 42826 7970e9b 42825->42826 42828 7991b08 8 API calls 42826->42828 42829 7991afb 8 API calls 42826->42829 42827 7970ea8 42827->42806 42828->42827 42829->42827 42831 7970e90 42830->42831 42833 7991b08 8 API calls 42831->42833 42834 7991afb 8 API calls 42831->42834 42832 7970ea8 42832->42806 42833->42832 42834->42832 42747 6e358c8 42748 6e358e2 42747->42748 42749 6e34b18 8 API calls 42748->42749 42750 6e35929 42749->42750 42501 7971d49 42502 7971d27 42501->42502 42503 7971d87 42502->42503 42506 7971df0 42502->42506 42510 7971e0b 42502->42510 42507 7971e0a 42506->42507 42515 7971e10 42506->42515 42525 7971e20 42506->42525 42507->42502 42511 7971e02 42510->42511 42513 7971e10 8 API calls 42511->42513 42514 7971e20 8 API calls 42511->42514 42512 7971e0a 42512->42502 42513->42512 42514->42512 42516 7971e20 42515->42516 42518 7971e4f 42516->42518 42535 7992378 42516->42535 42540 7992367 42516->42540 42517 7971e4a 42545 6e30f28 42517->42545 42550 6e30e40 42517->42550 42555 6e30e31 42517->42555 42560 6e30f18 42517->42560 42518->42507 42526 7971e28 42525->42526 42528 7971e4f 42526->42528 42533 7992378 8 API calls 42526->42533 42534 7992367 8 API calls 42526->42534 42527 7971e4a 42529 6e30e31 2 API calls 42527->42529 42530 6e30e40 2 API calls 42527->42530 42531 6e30f28 2 API calls 42527->42531 42532 6e30f18 2 API calls 42527->42532 42528->42507 42529->42528 42530->42528 42531->42528 42532->42528 42533->42527 42534->42527 42536 799238c 42535->42536 42565 7992439 42536->42565 42570 7992448 42536->42570 42537 79923f0 42537->42517 42541 7992378 42540->42541 42543 7992439 8 API calls 42541->42543 42544 7992448 8 API calls 42541->42544 42542 79923f0 42542->42517 42543->42542 42544->42542 42546 6e30f38 42545->42546 42547 6e30f72 42546->42547 42723 6e31229 42546->42723 42729 6e31238 42546->42729 42547->42518 42551 6e30e60 42550->42551 42552 6e30e89 42550->42552 42551->42552 42553 6e31229 2 API calls 42551->42553 42554 6e31238 2 API calls 42551->42554 42552->42518 42553->42552 42554->42552 42557 6e30e3a 42555->42557 42556 6e30e89 42556->42518 42557->42556 42558 6e31229 2 API calls 42557->42558 42559 6e31238 2 API calls 42557->42559 42558->42556 42559->42556 42562 6e30f1d 42560->42562 42561 6e30f72 42561->42518 42562->42561 42563 6e31229 2 API calls 42562->42563 42564 6e31238 2 API calls 42562->42564 42563->42561 42564->42561 42566 7992449 42565->42566 42575 7991b08 42566->42575 42582 7991afb 42566->42582 42567 7992460 42567->42537 42571 7992453 42570->42571 42573 7991b08 8 API calls 42571->42573 42574 7991afb 8 API calls 42571->42574 42572 7992460 42572->42537 42573->42572 42574->42572 42576 7991b64 42575->42576 42577 7991b1b 42575->42577 42578 7991c06 42576->42578 42588 6e34af4 42576->42588 42595 6e34b18 42576->42595 42602 6e34af9 42576->42602 42577->42567 42578->42567 42583 7991b03 42582->42583 42584 7991b1b 42583->42584 42585 6e34af4 8 API calls 42583->42585 42586 6e34af9 8 API calls 42583->42586 42587 6e34b18 8 API calls 42583->42587 42584->42567 42585->42584 42586->42584 42587->42584 42589 6e34af8 42588->42589 42591 6e34afe 42588->42591 42589->42578 42590 6e34b42 42590->42578 42590->42590 42591->42590 42608 6e34c17 42591->42608 42612 6e34d7f 42591->42612 42616 6e34c28 42591->42616 42596 6e34b42 42595->42596 42597 6e34b4a 42595->42597 42596->42578 42598 6e34b79 42597->42598 42599 6e34c17 8 API calls 42597->42599 42600 6e34c28 8 API calls 42597->42600 42601 6e34d7f 8 API calls 42597->42601 42599->42598 42600->42598 42601->42598 42604 6e34afc 42602->42604 42603 6e34b42 42603->42578 42603->42603 42604->42603 42605 6e34c17 8 API calls 42604->42605 42606 6e34c28 8 API calls 42604->42606 42607 6e34d7f 8 API calls 42604->42607 42605->42603 42606->42603 42607->42603 42610 6e34c28 42608->42610 42609 6e34d77 42609->42590 42610->42609 42620 6e33b00 42610->42620 42613 6e34cb9 42612->42613 42614 6e34d77 42613->42614 42615 6e33b00 8 API calls 42613->42615 42614->42590 42615->42614 42619 6e34c52 42616->42619 42617 6e34d77 42617->42590 42618 6e33b00 8 API calls 42618->42617 42619->42617 42619->42618 42621 6e33b2e 42620->42621 42623 6e33b6d 42620->42623 42622 6e33b5f 42621->42622 42621->42623 42624 6e33b72 42621->42624 42625 6e33bca 42621->42625 42633 6e33de1 42622->42633 42641 6e33df0 42622->42641 42623->42609 42624->42623 42649 6e34de8 42624->42649 42661 6e34dd7 42624->42661 42625->42623 42630 6e34c17 8 API calls 42625->42630 42631 6e34c28 8 API calls 42625->42631 42632 6e34d7f 8 API calls 42625->42632 42630->42623 42631->42623 42632->42623 42634 6e33dea 42633->42634 42635 6e33e88 42634->42635 42636 6e33e92 42634->42636 42676 6e33ee0 42634->42676 42686 6e33ed0 42634->42686 42697 6e34d92 42635->42697 42701 6e34da0 42635->42701 42636->42623 42643 6e33e18 42641->42643 42642 6e33e92 42642->42623 42643->42642 42644 6e33e88 42643->42644 42647 6e33ee0 8 API calls 42643->42647 42648 6e33ed0 8 API calls 42643->42648 42645 6e34d92 8 API calls 42644->42645 42646 6e34da0 8 API calls 42644->42646 42645->42642 42646->42642 42647->42644 42648->42644 42650 6e34e09 42649->42650 42651 6e34ebf 42649->42651 42652 6e34e16 42650->42652 42654 6e34ec4 42650->42654 42651->42625 42653 6e34e76 42652->42653 42705 6e3502a 42652->42705 42714 6e35038 42652->42714 42653->42651 42657 6e34dd7 8 API calls 42653->42657 42658 6e34de8 8 API calls 42653->42658 42654->42651 42655 6e34dd7 8 API calls 42654->42655 42656 6e34de8 8 API calls 42654->42656 42655->42651 42656->42651 42657->42651 42658->42651 42662 6e34ddb 42661->42662 42663 6e34dc0 42661->42663 42666 6e34e16 42662->42666 42668 6e34ec4 42662->42668 42669 6e34ebf 42662->42669 42664 6e33b00 8 API calls 42663->42664 42665 6e34dd0 42664->42665 42665->42625 42667 6e34e76 42666->42667 42674 6e3502a 8 API calls 42666->42674 42675 6e35038 8 API calls 42666->42675 42667->42669 42672 6e34dd7 8 API calls 42667->42672 42673 6e34de8 8 API calls 42667->42673 42668->42669 42670 6e34dd7 8 API calls 42668->42670 42671 6e34de8 8 API calls 42668->42671 42669->42625 42670->42669 42671->42669 42672->42669 42673->42669 42674->42667 42675->42667 42677 6e33ff6 42676->42677 42678 6e33f04 42676->42678 42683 6e39933 8 API calls 42677->42683 42684 6e39791 8 API calls 42677->42684 42685 6e39927 8 API calls 42677->42685 42680 6e34080 8 API calls 42678->42680 42681 6e34090 8 API calls 42678->42681 42682 6e34026 8 API calls 42678->42682 42679 6e33fbc 42679->42635 42680->42679 42681->42679 42682->42679 42683->42679 42684->42679 42685->42679 42687 6e33ee0 42686->42687 42688 6e33ff6 42687->42688 42690 6e33f04 42687->42690 42694 6e39933 8 API calls 42688->42694 42695 6e39791 8 API calls 42688->42695 42696 6e39927 8 API calls 42688->42696 42689 6e33fbc 42689->42635 42691 6e34080 8 API calls 42690->42691 42692 6e34090 8 API calls 42690->42692 42693 6e34026 8 API calls 42690->42693 42691->42689 42692->42689 42693->42689 42694->42689 42695->42689 42696->42689 42698 6e34da0 42697->42698 42699 6e33b00 8 API calls 42698->42699 42700 6e34dd0 42698->42700 42699->42700 42700->42636 42702 6e34da8 42701->42702 42703 6e33b00 8 API calls 42702->42703 42704 6e34dd0 42702->42704 42703->42704 42704->42636 42706 6e35058 42705->42706 42707 6e35092 42706->42707 42708 6e35094 42706->42708 42709 6e35078 42706->42709 42707->42653 42712 6e350f2 8 API calls 42708->42712 42713 6e350f8 8 API calls 42708->42713 42710 6e3f98b 8 API calls 42709->42710 42711 6e3f998 8 API calls 42709->42711 42710->42707 42711->42707 42712->42707 42713->42707 42715 6e35058 42714->42715 42716 6e35092 42715->42716 42717 6e35094 42715->42717 42718 6e35078 42715->42718 42716->42653 42721 6e350f2 8 API calls 42717->42721 42722 6e350f8 8 API calls 42717->42722 42719 6e3f98b 8 API calls 42718->42719 42720 6e3f998 8 API calls 42718->42720 42719->42716 42720->42716 42721->42716 42722->42716 42724 6e31238 42723->42724 42725 6e31248 42724->42725 42735 6e31300 42724->42735 42739 6e31310 42724->42739 42725->42547 42726 6e3129c 42726->42547 42730 6e31248 42729->42730 42731 6e3128f 42729->42731 42730->42547 42733 6e31300 GetCurrentThreadId 42731->42733 42734 6e31310 GetCurrentThreadId 42731->42734 42732 6e3129c 42732->42547 42733->42732 42734->42732 42736 6e31363 42735->42736 42737 6e313cf GetCurrentThreadId 42736->42737 42738 6e3139f 42736->42738 42737->42738 42738->42738 42740 6e31363 42739->42740 42741 6e313cf GetCurrentThreadId 42740->42741 42742 6e3139f 42740->42742 42741->42742 42742->42742 42493 19fb6d0 GetCurrentProcess 42494 19fb74a GetCurrentThread 42493->42494 42495 19fb743 42493->42495 42496 19fb787 GetCurrentProcess 42494->42496 42497 19fb780 42494->42497 42495->42494 42498 19fb7bd 42496->42498 42497->42496 42499 19fb7e5 GetCurrentThreadId 42498->42499 42500 19fb816 42499->42500 42743 19fbd00 DuplicateHandle 42744 19fbd96 42743->42744 42745 19ffe40 SetWindowLongW 42746 19ffeac 42745->42746 42751 19f92f0 42755 19f93d9 42751->42755 42763 19f93e8 42751->42763 42752 19f92ff 42756 19f93e8 42755->42756 42757 19f9413 42756->42757 42771 19f9670 42756->42771 42775 19f9660 42756->42775 42757->42752 42758 19f940b 42758->42757 42759 19f9610 GetModuleHandleW 42758->42759 42760 19f963d 42759->42760 42760->42752 42764 19f93e9 42763->42764 42765 19f9413 42764->42765 42769 19f9670 LoadLibraryExW 42764->42769 42770 19f9660 LoadLibraryExW 42764->42770 42765->42752 42766 19f940b 42766->42765 42767 19f9610 GetModuleHandleW 42766->42767 42768 19f963d 42767->42768 42768->42752 42769->42766 42770->42766 42773 19f9684 42771->42773 42772 19f96a9 42772->42758 42773->42772 42779 19f8768 42773->42779 42776 19f9670 42775->42776 42777 19f8768 LoadLibraryExW 42776->42777 42778 19f96a9 42776->42778 42777->42778 42778->42758 42780 19f9850 LoadLibraryExW 42779->42780 42782 19f98c9 42780->42782 42782->42772

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 38 7991d40-7991d4c 77 7991d4e call 7991e4d 38->77 78 7991d4e call 7991d40 38->78 79 7991d4e call 7991e30 38->79 80 7991d4e call 7991d33 38->80 81 7991d4e call 7991e13 38->81 39 7991d54-7991d89 43 7991d8b-7991da0 39->43 44 7991da2-7991da9 39->44 48 7991dab-7991db2 44->48 49 7991e26-7991e6b 44->49 50 7991dbb-7991de0 48->50 51 7991db4-7991db9 48->51 56 79920fa-7992199 GetSystemTimes 49->56 57 7991e71-7991faf 49->57 82 7991de3 call 7991e4d 50->82 83 7991de3 call 7991e30 50->83 84 7991de3 call 7991d40 50->84 85 7991de3 call 7992110 50->85 86 7991de3 call 7991e13 50->86 87 7991de3 call 7991d33 50->87 51->50 55 7991de8-7991dea 58 7991dec-7991df5 55->58 59 7991df6-7991e02 55->59 67 799219b-79921a1 56->67 68 79921a2-79921c3 56->68 71 7991fd1-7991fea 57->71 72 7991fb1-7991fcf 57->72 59->56 60 7991e08-79920d0 59->60 60->56 67->68 73 7991fef-79920c6 71->73 72->73 73->56 77->39 78->39 79->39 80->39 81->39 82->55 83->55 84->55 85->55 86->55 87->55
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.544035652.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7990000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: E
                                      • API String ID: 0-3568589458
                                      • Opcode ID: 919baf5985ca637f0f1004e82ccb4458315db646a71f85fb5373c1ea3a5fa51f
                                      • Instruction ID: 8e2b96caf90fa7b5ea366474ae5edbde25497a89eef1e0b4c8f9846c7bbcf95e
                                      • Opcode Fuzzy Hash: 919baf5985ca637f0f1004e82ccb4458315db646a71f85fb5373c1ea3a5fa51f
                                      • Instruction Fuzzy Hash: 08E10A75D0021ACFDB11DF69C8806D9FBB5FF49310F14C6AAD958AB201E770AA85CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.542292991.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6e30000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0d92ae3005cb9837ff526abb40bb1c5bfff7501cd310680e13681068438bc646
                                      • Instruction ID: e3393fa73f680f35c2a55b4810017232fe03a93955b234156af87f455d775c4b
                                      • Opcode Fuzzy Hash: 0d92ae3005cb9837ff526abb40bb1c5bfff7501cd310680e13681068438bc646
                                      • Instruction Fuzzy Hash: 2A51CF78D01209DFCB15DFA8D898AAEBBB2FF8C301F109069E916A7394DB356945CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.544035652.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7990000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 833fe2a40f986e30887e835d31442e6c5b42410f90671301c696899e53de1b3f
                                      • Instruction ID: e1513a948027379dd91bfdc04fb6bcd8500a4925f1f0af37927a31679f23506d
                                      • Opcode Fuzzy Hash: 833fe2a40f986e30887e835d31442e6c5b42410f90671301c696899e53de1b3f
                                      • Instruction Fuzzy Hash: 9501D471D052149BDF048FA9E8083FEBFFAEF4E351F14642AD505B3290CB348844CAA8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.544035652.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7990000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5f7d514f7016efdf2075a99ed935be72804db5798ba249b7349e7e5517a43b96
                                      • Instruction ID: cf1436954d332435655067da0fba10478ee104d39f21ff2deae1f5a095869f69
                                      • Opcode Fuzzy Hash: 5f7d514f7016efdf2075a99ed935be72804db5798ba249b7349e7e5517a43b96
                                      • Instruction Fuzzy Hash: 12F03171D122189BDF049FA9E4087EDBBFAEF8E352F14643AD109B3250DB745944CBA8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 019FB730
                                      • GetCurrentThread.KERNEL32 ref: 019FB76D
                                      • GetCurrentProcess.KERNEL32 ref: 019FB7AA
                                      • GetCurrentThreadId.KERNEL32 ref: 019FB803
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.519673575.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_19f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: e18372ece7be3f453d619a305acc29afb74dbb5ed089c7c44ab63e14e45b40e3
                                      • Instruction ID: de79f9b8fbf87a413d55d82e9983890d6c68ff14d65b21bbe39a6634dfe02fa3
                                      • Opcode Fuzzy Hash: e18372ece7be3f453d619a305acc29afb74dbb5ed089c7c44ab63e14e45b40e3
                                      • Instruction Fuzzy Hash: 2B5174B89006499FDB10CFAAC9887DEBBF5AF48304F24845EE11AA7650D7759884CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 019FB730
                                      • GetCurrentThread.KERNEL32 ref: 019FB76D
                                      • GetCurrentProcess.KERNEL32 ref: 019FB7AA
                                      • GetCurrentThreadId.KERNEL32 ref: 019FB803
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.519673575.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_19f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: 9e6ed56f106d1c1ac7a95d5e6a53f8d702707af00ff44440326adaa0341c4965
                                      • Instruction ID: 929155a5c214e391776e0ec0b55151aadaa4a1f33ed3806f0899e76222ba61cf
                                      • Opcode Fuzzy Hash: 9e6ed56f106d1c1ac7a95d5e6a53f8d702707af00ff44440326adaa0341c4965
                                      • Instruction Fuzzy Hash: D25184B4900648DFDB10CFAAC988BDEBBF5BB48304F24841DE11AA7350D7746884CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 122 7991e4d-7991e59 123 79920fa-7992199 GetSystemTimes 122->123 124 7991e5f-7991e6b 122->124 131 799219b-79921a1 123->131 132 79921a2-79921c3 123->132 124->123 125 7991e71-7991faf 124->125 136 7991fd1-7991fea 125->136 137 7991fb1-7991fcf 125->137 131->132 138 7991fef-79920c6 136->138 137->138 138->123
                                      APIs
                                      • GetSystemTimes.KERNELBASE(?,?,?), ref: 0799218C
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.544035652.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7990000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: SystemTimes
                                      • String ID:
                                      • API String ID: 375623090-0
                                      • Opcode ID: 2321b59f81b333796b66197ff204328d131e4dfff1356191ce2adfb35f5b1827
                                      • Instruction ID: e4c2b77ddb1e79126dfbf70aefb5999126528f96ea9a09b9dc6b56d18f76aab4
                                      • Opcode Fuzzy Hash: 2321b59f81b333796b66197ff204328d131e4dfff1356191ce2adfb35f5b1827
                                      • Instruction Fuzzy Hash: 87B182B5D0021ACFDB51CF59C880AD9FBB5FF49310F15C69AD958AB201E770AA85CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 141 6e33208-6e33224 142 6e33226-6e33237 141->142 143 6e3323a-6e3329b 141->143 152 6e332a9-6e33333 143->152 153 6e33278-6e332a7 143->153 161 6e33335-6e3333f 152->161 162 6e3336c-6e3339f 152->162 161->162 163 6e33341-6e33343 161->163 169 6e333a7-6e333f8 DnsQuery_A 162->169 164 6e33366-6e33369 163->164 165 6e33345-6e3334f 163->165 164->162 167 6e33353-6e33362 165->167 168 6e33351 165->168 167->167 170 6e33364 167->170 168->167 171 6e33401-6e3344e 169->171 172 6e333fa-6e33400 169->172 170->164 177 6e33450-6e33454 171->177 178 6e3345e-6e33462 171->178 172->171 177->178 179 6e33456 177->179 180 6e33471-6e33475 178->180 181 6e33464-6e33467 178->181 179->178 182 6e33477-6e33483 180->182 183 6e33486 180->183 181->180 182->183 185 6e33487 183->185 185->185
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.542292991.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6e30000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6f9afd81385a49aeaa59926ae61ed24d336dc60c420ca4e42d2da75e38fb110d
                                      • Instruction ID: 169e791553ecccf977816fe7759fc2445566ce27d12d0bf98d3df936b3897c99
                                      • Opcode Fuzzy Hash: 6f9afd81385a49aeaa59926ae61ed24d336dc60c420ca4e42d2da75e38fb110d
                                      • Instruction Fuzzy Hash: 4B816871D00359CFDB50CFA9C988ADEFBB2FF48314F20852AD815AB250DB71A945CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 186 19f93e8-19f93fd call 19f8704 190 19f93ff 186->190 191 19f9413-19f9417 186->191 240 19f9405 call 19f9670 190->240 241 19f9405 call 19f9660 190->241 192 19f942b-19f946c 191->192 193 19f9419-19f9423 191->193 198 19f946e-19f9476 192->198 199 19f9479-19f9487 192->199 193->192 194 19f940b-19f940d 194->191 196 19f9548-19f9608 194->196 235 19f960a-19f960d 196->235 236 19f9610-19f963b GetModuleHandleW 196->236 198->199 200 19f94ab-19f94ad 199->200 201 19f9489-19f948e 199->201 205 19f94b0-19f94b7 200->205 203 19f9499 201->203 204 19f9490-19f9497 call 19f8710 201->204 208 19f949b-19f94a9 203->208 204->208 209 19f94b9-19f94c1 205->209 210 19f94c4-19f94cb 205->210 208->205 209->210 212 19f94cd-19f94d5 210->212 213 19f94d8-19f94e1 call 19f8720 210->213 212->213 217 19f94ee-19f94f3 213->217 218 19f94e3-19f94eb 213->218 220 19f94f5-19f94fc 217->220 221 19f9511-19f9515 217->221 218->217 220->221 222 19f94fe-19f950e call 19f8730 call 19f8740 220->222 242 19f9518 call 19f9968 221->242 243 19f9518 call 19f9940 221->243 222->221 225 19f951b-19f951e 228 19f9541-19f9547 225->228 229 19f9520-19f953e 225->229 229->228 235->236 237 19f963d-19f9643 236->237 238 19f9644-19f9658 236->238 237->238 240->194 241->194 242->225 243->225
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 019F962E
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.519673575.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_19f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 98a4bde0014c8e1e52ac801d0b0e974cfe5f01c805605bb135e88929d167291c
                                      • Instruction ID: f0f1663fa7d0bb182b7f3c24656d8dc055cfce77d3de25ae695ebe4ac41585a7
                                      • Opcode Fuzzy Hash: 98a4bde0014c8e1e52ac801d0b0e974cfe5f01c805605bb135e88929d167291c
                                      • Instruction Fuzzy Hash: 28712670A00B059FD764CF2AD44475ABBF5BF88318F10892EE68AD7A50D735E845CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 244 19ffb61-19ffb88 245 19ffbec-19ffc5e 244->245 246 19ffb8a-19ffbd8 call 19fda04 244->246 248 19ffc69-19ffc70 245->248 249 19ffc60-19ffc66 245->249 250 19ffbdd-19ffbde 246->250 251 19ffc7b-19ffd1a CreateWindowExW 248->251 252 19ffc72-19ffc78 248->252 249->248 254 19ffd1c-19ffd22 251->254 255 19ffd23-19ffd5b 251->255 252->251 254->255 259 19ffd5d-19ffd60 255->259 260 19ffd68 255->260 259->260 261 19ffd69 260->261 261->261
                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 019FFD0A
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.519673575.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_19f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: 3063faaac49429a36883b68948c95e7fc4cbf184b98f7ce10a5719cd5e832c9c
                                      • Instruction ID: 42b892172da05c32c697d5ae4c7cedaeb28be3ec39a73eba870222ee896d666f
                                      • Opcode Fuzzy Hash: 3063faaac49429a36883b68948c95e7fc4cbf184b98f7ce10a5719cd5e832c9c
                                      • Instruction Fuzzy Hash: 126145B2C04249EFDF05CF99D884ACDBFB6BF49304F24815AE918AB261C7719855CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 262 6e31b54-6e33333 265 6e33335-6e3333f 262->265 266 6e3336c-6e333f8 DnsQuery_A 262->266 265->266 267 6e33341-6e33343 265->267 275 6e33401-6e3344e 266->275 276 6e333fa-6e33400 266->276 268 6e33366-6e33369 267->268 269 6e33345-6e3334f 267->269 268->266 271 6e33353-6e33362 269->271 272 6e33351 269->272 271->271 274 6e33364 271->274 272->271 274->268 281 6e33450-6e33454 275->281 282 6e3345e-6e33462 275->282 276->275 281->282 283 6e33456 281->283 284 6e33471-6e33475 282->284 285 6e33464-6e33467 282->285 283->282 286 6e33477-6e33483 284->286 287 6e33486 284->287 285->284 286->287 289 6e33487 287->289 289->289
                                      APIs
                                      • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06E333E8
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.542292991.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6e30000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: Query_
                                      • String ID:
                                      • API String ID: 428220571-0
                                      • Opcode ID: 8f48994dcd1f44c3fb7875253965b1abd7569e445e5d7ee55c1baceacd86d105
                                      • Instruction ID: e45da202e0eff5f840d5548ee815ddb6c16dd6802e971f011e50414a8ede1c0f
                                      • Opcode Fuzzy Hash: 8f48994dcd1f44c3fb7875253965b1abd7569e445e5d7ee55c1baceacd86d105
                                      • Instruction Fuzzy Hash: 1C512571D0035D9FDB60CFA9C884ADEBBB1FF48314F248129E814AB250DB75A986CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 290 19ffbf8-19ffc5e 291 19ffc69-19ffc70 290->291 292 19ffc60-19ffc66 290->292 293 19ffc7b-19ffcb3 291->293 294 19ffc72-19ffc78 291->294 292->291 295 19ffcbb-19ffd1a CreateWindowExW 293->295 294->293 296 19ffd1c-19ffd22 295->296 297 19ffd23-19ffd5b 295->297 296->297 301 19ffd5d-19ffd60 297->301 302 19ffd68 297->302 301->302 303 19ffd69 302->303 303->303
                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 019FFD0A
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.519673575.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_19f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: 8aa5e50bb1c57a8cb2cbed1b261a2fe4fe2f66c82638e459803c804d8e00234e
                                      • Instruction ID: 7ac572f9c623485b25216a677495e80b5f6f20ba050e4f40bdc7e6a90031b682
                                      • Opcode Fuzzy Hash: 8aa5e50bb1c57a8cb2cbed1b261a2fe4fe2f66c82638e459803c804d8e00234e
                                      • Instruction Fuzzy Hash: 5441C0B1D00309EFDB14CF9AD884ADEBFB5BF48314F24812AE919AB250D7759945CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 304 6e31310-6e3137c 308 6e31389-6e3139d 304->308 309 6e3137e-6e31387 304->309 315 6e313b9-6e313c3 308->315 316 6e3139f-6e313b7 308->316 312 6e313c5-6e313c7 309->312 314 6e313cf-6e313fd GetCurrentThreadId 312->314 318 6e31406-6e3142b 314->318 319 6e313ff-6e31405 314->319 315->312 317 6e3142d-6e31431 316->317 320 6e31433 317->320 321 6e3143c 317->321 318->317 319->318 320->321 324 6e3143d 321->324 324->324
                                      APIs
                                      • GetCurrentThreadId.KERNEL32 ref: 06E313E9
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.542292991.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6e30000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: CurrentThread
                                      • String ID:
                                      • API String ID: 2882836952-0
                                      • Opcode ID: 3b6c3167c2f7efb7a19063aa3eb4b17a6c9ba2d9ebde5f67864911eac5e72739
                                      • Instruction ID: 5b3623463b5ea865dcbf94f0aae0a604f6f9ee48c74659bb73be793156f09795
                                      • Opcode Fuzzy Hash: 3b6c3167c2f7efb7a19063aa3eb4b17a6c9ba2d9ebde5f67864911eac5e72739
                                      • Instruction Fuzzy Hash: 4C314974E002289FDB64DFA9D488BEDBBF5AF48614F14805DE406A7350DB749846CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 325 799866c-79986cf 326 7998708-7998752 LoadLibraryA 325->326 327 79986d1-79986db 325->327 334 799875b-799878c 326->334 335 7998754-799875a 326->335 327->326 328 79986dd-79986df 327->328 329 79986e1-79986eb 328->329 330 7998702-7998705 328->330 332 79986ed 329->332 333 79986ef-79986fe 329->333 330->326 332->333 333->333 336 7998700 333->336 338 799879c 334->338 339 799878e-7998792 334->339 335->334 336->330 342 799879d 338->342 339->338 341 7998794 339->341 341->338 342->342
                                      APIs
                                      • LoadLibraryA.KERNELBASE(?), ref: 07998742
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.544035652.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7990000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: adc9b211d1090afc1694e873d1bf78168334993cdbbba6f35a840d2049c8f995
                                      • Instruction ID: 8a468aa7c38f08bd08e459b7f022d22ddb69b619c7d3eb8495abd56851d11f55
                                      • Opcode Fuzzy Hash: adc9b211d1090afc1694e873d1bf78168334993cdbbba6f35a840d2049c8f995
                                      • Instruction Fuzzy Hash: 983147B5D1064A8FEF10CFA9C885B9EBFF5AB09314F14852DE815AB380D7789481CF85
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 343 7996734-79986cf 345 7998708-7998752 LoadLibraryA 343->345 346 79986d1-79986db 343->346 353 799875b-799878c 345->353 354 7998754-799875a 345->354 346->345 347 79986dd-79986df 346->347 348 79986e1-79986eb 347->348 349 7998702-7998705 347->349 351 79986ed 348->351 352 79986ef-79986fe 348->352 349->345 351->352 352->352 355 7998700 352->355 357 799879c 353->357 358 799878e-7998792 353->358 354->353 355->349 361 799879d 357->361 358->357 360 7998794 358->360 360->357 361->361
                                      APIs
                                      • LoadLibraryA.KERNELBASE(?), ref: 07998742
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.544035652.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7990000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: a013d155c65c134240140d9834ee876a8cdef8f921333e9d2d9f5f039fc6e8d8
                                      • Instruction ID: db37d126327bcaee0c74dc36743f5f20d8e173548e256177c73b981e3e3d6a57
                                      • Opcode Fuzzy Hash: a013d155c65c134240140d9834ee876a8cdef8f921333e9d2d9f5f039fc6e8d8
                                      • Instruction Fuzzy Hash: F43157B0D10209CFEF10CFA9C885B9DBBF5AB0A318F10852DE815AB380D7789481CF85
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 983 7991e13-7991e1f 984 79920fa-7992199 GetSystemTimes 983->984 985 7991e25-79920e1 983->985 990 799219b-79921a1 984->990 991 79921a2-79921c3 984->991 985->984 990->991
                                      APIs
                                      • GetSystemTimes.KERNELBASE(?,?,?), ref: 0799218C
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.544035652.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7990000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: SystemTimes
                                      • String ID:
                                      • API String ID: 375623090-0
                                      • Opcode ID: a863a306f788bbe7eb7444ab37d52412dbe29b9109f1a7d313aceceee1385034
                                      • Instruction ID: 4a43693f72d8a9202e28e188e6a3af9b7f89f33e3b178e20c778a71235cf9438
                                      • Opcode Fuzzy Hash: a863a306f788bbe7eb7444ab37d52412dbe29b9109f1a7d313aceceee1385034
                                      • Instruction Fuzzy Hash: 233153B0C01249EFDB40CFA9D880ADEFFF4BF49310F24806AE818AB241D3749945CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 994 7991e30-7991e3c 995 79920fa-7992199 GetSystemTimes 994->995 996 7991e42-79920f2 994->996 1001 799219b-79921a1 995->1001 1002 79921a2-79921c3 995->1002 996->995 1001->1002
                                      APIs
                                      • GetSystemTimes.KERNELBASE(?,?,?), ref: 0799218C
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.544035652.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7990000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: SystemTimes
                                      • String ID:
                                      • API String ID: 375623090-0
                                      • Opcode ID: 1550cf3b821e1f31d85f80b74e8fb1345202da3f5431ef46c72f04b859969bd9
                                      • Instruction ID: 3a10b63c73f4a6600a446cd401d72eccb64bd01afbb568ad144009ba177ef506
                                      • Opcode Fuzzy Hash: 1550cf3b821e1f31d85f80b74e8fb1345202da3f5431ef46c72f04b859969bd9
                                      • Instruction Fuzzy Hash: BA3133B5C05249DFDB50CFA9D9806DEBFF4BF49314F24806AE408AB241D3749945CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetCurrentThreadId.KERNEL32 ref: 06E313E9
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.542292991.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6e30000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: CurrentThread
                                      • String ID:
                                      • API String ID: 2882836952-0
                                      • Opcode ID: df43163deaed0f750bf3f57d0117b95b4ac213fba3c1ac77ddb0b0f2e2217844
                                      • Instruction ID: 5a1e951cd551c89412b1b80e9a656f5adf4d891628df4880791c94960a8e92f6
                                      • Opcode Fuzzy Hash: df43163deaed0f750bf3f57d0117b95b4ac213fba3c1ac77ddb0b0f2e2217844
                                      • Instruction Fuzzy Hash: A63178B5E00218DFCB64DFA9D888BEDBBF5AB48314F15805EE406A7390CB749846CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 019FBD87
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.519673575.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_19f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 04a6f19934c56bb7e9aa444f482e69455f209d3ef3b131e2f74ed6c6fc2f9e03
                                      • Instruction ID: 695fe81defeccc6e10fcddd888214ff1a74097e058b75d59ecd869d7e7f2322c
                                      • Opcode Fuzzy Hash: 04a6f19934c56bb7e9aa444f482e69455f209d3ef3b131e2f74ed6c6fc2f9e03
                                      • Instruction Fuzzy Hash: 7F21E6B5900208DFDB10CF9AD984ADEBFF9EB48314F14841AE918A7350C378A954CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 019FBD87
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.519673575.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_19f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: f28f8490796d4284651e7a3dcc991393b90c492ff429aba79a776bbb0519c277
                                      • Instruction ID: e5ab72dffa3d26b51e25530cb773f55aa8e8452332c81a34375b23ef0e7b5bad
                                      • Opcode Fuzzy Hash: f28f8490796d4284651e7a3dcc991393b90c492ff429aba79a776bbb0519c277
                                      • Instruction Fuzzy Hash: A421E6B9900208DFDB10CFA9D984ADEBFF5EB48314F14841AE959B7350C3789954CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetSystemTimes.KERNELBASE(?,?,?), ref: 0799218C
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.544035652.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7990000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: SystemTimes
                                      • String ID:
                                      • API String ID: 375623090-0
                                      • Opcode ID: aebf67b7f769d22a223fb53363e37d07ab922fc6fd5f8e09e8d61f60b32b17d6
                                      • Instruction ID: 3efe94f2c654077179c91bc332851b1beeee23bcd0eda525e12b378bc326af74
                                      • Opcode Fuzzy Hash: aebf67b7f769d22a223fb53363e37d07ab922fc6fd5f8e09e8d61f60b32b17d6
                                      • Instruction Fuzzy Hash: 4A2107B1D01209DFDB50CF9AD9847DEFBF5EF48314F24806AE908AB241D3749940CBA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,019F96A9,00000800,00000000,00000000), ref: 019F98BA
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.519673575.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_19f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 33703baeaffdeb5ab529370bf917c2de1c02bbbde3bda20ca2d02a58986c217a
                                      • Instruction ID: a2c76cb7af69fef6d2fe7b652572c3c63eadf1a3c8630dd16897b20293a61284
                                      • Opcode Fuzzy Hash: 33703baeaffdeb5ab529370bf917c2de1c02bbbde3bda20ca2d02a58986c217a
                                      • Instruction Fuzzy Hash: 5111C4B6900209DFDB14CF9AD844BDEBBF5AB48314F14842EE519A7600C375A945CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,019F96A9,00000800,00000000,00000000), ref: 019F98BA
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.519673575.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_19f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: b976e192f1b5e685194cbe49a8284e71f58917de22ed9a1d88da715f2b43a05d
                                      • Instruction ID: 41f74d970d88c553c7aa47cbcff96d620433fae896c5774b47cb14008187fb8a
                                      • Opcode Fuzzy Hash: b976e192f1b5e685194cbe49a8284e71f58917de22ed9a1d88da715f2b43a05d
                                      • Instruction Fuzzy Hash: F111F2B6D002099FDB14CF9AD944BDEBBF5AB48314F14841EE529A7600C375A545CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 019F962E
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.519673575.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_19f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 82bb9c5c9d31fce3d063cbc5abca13357633a82ca7760db9e9390c3e37f1596a
                                      • Instruction ID: 631bdf20929948cd0a1e9d6e90cd5ca2eff30244c914544de57b7b46f904a6f0
                                      • Opcode Fuzzy Hash: 82bb9c5c9d31fce3d063cbc5abca13357633a82ca7760db9e9390c3e37f1596a
                                      • Instruction Fuzzy Hash: BC11E3B5C002499FDB10CF9AD844BDEFBF9AB88328F14845AD529B7600C375A545CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SetWindowLongW.USER32(?,?,?), ref: 019FFE9D
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.519673575.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_19f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: LongWindow
                                      • String ID:
                                      • API String ID: 1378638983-0
                                      • Opcode ID: b9769c15b951e9f345e7daa43ab4511d62aa1d41050862bf54423a7263f4e07f
                                      • Instruction ID: 1ca7779dc556f4e9a4779baabf44d69f4fbe45e9f4d31ee5ad7e21c12ce89f3d
                                      • Opcode Fuzzy Hash: b9769c15b951e9f345e7daa43ab4511d62aa1d41050862bf54423a7263f4e07f
                                      • Instruction Fuzzy Hash: 591106B6800208DFDB10CF99D985BDEFBF8EB48324F20845AD958B7641C374A944CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SetWindowLongW.USER32(?,?,?), ref: 019FFE9D
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.519673575.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_19f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: LongWindow
                                      • String ID:
                                      • API String ID: 1378638983-0
                                      • Opcode ID: 2c9fbcb45fe8504489638d0ad1fe79748a9b660353b9c2af4ea478690d1b08a4
                                      • Instruction ID: 954254b56d8db9a545bb41fd6e1ffa7ac39071856c91814a75a1beb7eb3d4182
                                      • Opcode Fuzzy Hash: 2c9fbcb45fe8504489638d0ad1fe79748a9b660353b9c2af4ea478690d1b08a4
                                      • Instruction Fuzzy Hash: A711D3B58002499FDB20CF9AD985BDEBBF8EB48324F20845AD959B7241C375A944CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: @ 8q
                                      • API String ID: 0-2994748560
                                      • Opcode ID: a9a13dff6c00f8c4657cc123d071f7497d4de4bdf63064cf73cce8fc8c789992
                                      • Instruction ID: bbadfaf09041901fb28c1f490c44f5fa8c39e3ed04b030d9cbbf999a86e7b220
                                      • Opcode Fuzzy Hash: a9a13dff6c00f8c4657cc123d071f7497d4de4bdf63064cf73cce8fc8c789992
                                      • Instruction Fuzzy Hash: EE41CC70B101058FCB48EBB895546BEB7F7EFC8650B508469D906EB354EF34AC01CBA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: @ 8q
                                      • API String ID: 0-2994748560
                                      • Opcode ID: ee5499eb3860845620689dab9e61683cd119063acfe8a5fef77cfcf1720f04bd
                                      • Instruction ID: 8dfda505e620445ea9f3a0111f937a6a8f645f5f4c98155e229d9c568667e89a
                                      • Opcode Fuzzy Hash: ee5499eb3860845620689dab9e61683cd119063acfe8a5fef77cfcf1720f04bd
                                      • Instruction Fuzzy Hash: 3531F3B1B1110A8FCB54EBB899182BEB7FBEFC9654B10486AD506DB345DF709C01C7A2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2e698a42c347f467b8a4e30f27618cecd43470af957e17eaa6ff882e4c82a56e
                                      • Instruction ID: eac98c51488b96b23ac59ce80a1c48fce4e504064f740fffff5060759d411e30
                                      • Opcode Fuzzy Hash: 2e698a42c347f467b8a4e30f27618cecd43470af957e17eaa6ff882e4c82a56e
                                      • Instruction Fuzzy Hash: B13193313046508FC7159B3CE818A597BE6EFC5719B1580EAE509CF7A2CB62DC05C7D1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 459c3a0c82026fe4569d85ddb7711887bbb512241a248f6cc832ed88922fb23b
                                      • Instruction ID: f5974e04f099cdb962c7fbcef5e58cf72f22957acd5d127ca25839412c741bce
                                      • Opcode Fuzzy Hash: 459c3a0c82026fe4569d85ddb7711887bbb512241a248f6cc832ed88922fb23b
                                      • Instruction Fuzzy Hash: A7316DB5D1020DDFDB14CF94D4846DDBBB5FF86318F24895AD415AB201E772A946CF80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.517194665.00000000015ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_15ed000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 273d635da29e67e8eeab8f8a1068638051dd495a18294e6cf5f205c80c30a12b
                                      • Instruction ID: 496ced36ebaf2c39fc1b444a5338671049ecaecc7b682a319816835fb1efa0ba
                                      • Opcode Fuzzy Hash: 273d635da29e67e8eeab8f8a1068638051dd495a18294e6cf5f205c80c30a12b
                                      • Instruction Fuzzy Hash: A7210676900244DFDB09CF58D9C4B5ABFF5FB98324F24C569E8050F246C376E856C6A2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.517194665.00000000015ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_15ed000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3222b2c7391a3965f28c776500a50c0d1d1de61f493303e1ac57ed1a27c76e6f
                                      • Instruction ID: 0954b399c83eabbaea6bcb6e081b9b6008deae2e4751d1e0cb3d529c0b18758c
                                      • Opcode Fuzzy Hash: 3222b2c7391a3965f28c776500a50c0d1d1de61f493303e1ac57ed1a27c76e6f
                                      • Instruction Fuzzy Hash: 34213872900240DFDB0ACF58D9C4B1ABFF5FB84314F24856AD8050F216C336D455CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.517381183.00000000015FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015FD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_15fd000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9e9fc64fb02a523be9c0a256a4a08d3976305a99805b050f40780b7c7c09d893
                                      • Instruction ID: 3ab32c38e13e8303bcf65a7348a48f4083a76fb51745476ad83b2dd70de4b3de
                                      • Opcode Fuzzy Hash: 9e9fc64fb02a523be9c0a256a4a08d3976305a99805b050f40780b7c7c09d893
                                      • Instruction Fuzzy Hash: 0F214575204240DFDB15CF58D9C0B1ABBB9FB84354F24C96DD9094F246D33BD806CA61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 50edf21642d596ae8cd5ddbb189d418c10bc460a9fd415364fa275604e54fe37
                                      • Instruction ID: 4d47ecd6a772c27b127158e737ffc11b372fb26b2c64e3d8394025e695495fbe
                                      • Opcode Fuzzy Hash: 50edf21642d596ae8cd5ddbb189d418c10bc460a9fd415364fa275604e54fe37
                                      • Instruction Fuzzy Hash: FD11EBB93EC166CFC71A0A2154040BA7B67EBC2216B084C57D04387182CF709C4BCBD1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.517381183.00000000015FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015FD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_15fd000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 35071c783fda3e39b80b10a3ec751c9369afefd686f382d324bf681ef3092190
                                      • Instruction ID: 87f3a334a638f98f903b9e9c3d89b35678a256dbd0039da17c88ea26a7acdfd0
                                      • Opcode Fuzzy Hash: 35071c783fda3e39b80b10a3ec751c9369afefd686f382d324bf681ef3092190
                                      • Instruction Fuzzy Hash: C1216D755093808FDB02CF24D990715BF71EB46214F28C5EAD9498F657C33A984ACB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f60956f62e4ce36a4f4ce01e0c974b38c1e61578efeb1bb9e47fbd81609bc26d
                                      • Instruction ID: 34e6faedf9a4f80d16de3a64e7326c883d1808a6aeb3ff4abbc26f684297ca38
                                      • Opcode Fuzzy Hash: f60956f62e4ce36a4f4ce01e0c974b38c1e61578efeb1bb9e47fbd81609bc26d
                                      • Instruction Fuzzy Hash: B51106B5658219DBC7289F24A4550697BA7FFC2309B00CDBAD4078B609FF71E845CBA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.517194665.00000000015ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_15ed000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4e78fb41457c0dbc2d9524af8796639b843feda46be7989836c0fd150c2e2370
                                      • Instruction ID: 23a514177546854acfd82944b13bcb116f26517f7fdccf08c0cdb1e89c535413
                                      • Opcode Fuzzy Hash: 4e78fb41457c0dbc2d9524af8796639b843feda46be7989836c0fd150c2e2370
                                      • Instruction Fuzzy Hash: 6711E476804240CFDB06CF48D9C4B1ABFB1FB84324F2486AAD8450F256C336D456CB92
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.517194665.00000000015ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_15ed000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4e78fb41457c0dbc2d9524af8796639b843feda46be7989836c0fd150c2e2370
                                      • Instruction ID: 88d5ce6c171044c4c43981e2611f935df3e4972e077cb47a9b94c0ac1df4dcb3
                                      • Opcode Fuzzy Hash: 4e78fb41457c0dbc2d9524af8796639b843feda46be7989836c0fd150c2e2370
                                      • Instruction Fuzzy Hash: 6B110376804280CFCB06CF54D9C4B5ABFB1FB94324F28C6A9D8440F616C33AE456CBA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d8d18281d3ad864866936d2b26557a139ca797c7e1b49c10e0bbdad79ee1baaa
                                      • Instruction ID: f6df6e3f60df9e9d3d8428a45504879cd3991bf1aaa9c0bc368a8d031ee3c3a8
                                      • Opcode Fuzzy Hash: d8d18281d3ad864866936d2b26557a139ca797c7e1b49c10e0bbdad79ee1baaa
                                      • Instruction Fuzzy Hash: CC01F2613051AA1BD359A26D5C147AFDEDBAFC9B00F24C42EA10BCB3D2CD658C0643F6
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 423463fd90ca99c169d92365b26451f9f0833e699b7e6fca51a732f37a47c292
                                      • Instruction ID: d6dedf3aa5f7e2b9d89b82ecf6598e881dc290ff6f06e3941617a0fb64b5244a
                                      • Opcode Fuzzy Hash: 423463fd90ca99c169d92365b26451f9f0833e699b7e6fca51a732f37a47c292
                                      • Instruction Fuzzy Hash: 5911CEB0A583069FCB51EF68C81579EBFB0BF05229F2045ABC459DB292DB748202CBC0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4762a9f796f91fb987a8f58cdb9382793f166926352e47c9f3d25fd18c2181ff
                                      • Instruction ID: f2f007ad9fa837d26cebd9b5bfc3aa5831d62591488c27b18e4cdf1a19dcdc3a
                                      • Opcode Fuzzy Hash: 4762a9f796f91fb987a8f58cdb9382793f166926352e47c9f3d25fd18c2181ff
                                      • Instruction Fuzzy Hash: B30104B5254109DBC7289F25A455029BBA7FBC2309700CDB9D4078B609FF71EC46CBA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f37525c496f014b47ca021d889b313c7cd653b8bfb70f3bba3e7d58c114cd050
                                      • Instruction ID: 6157a5440dbb91c0272a715db78591782b474259298ef179d7233a7b6512cb40
                                      • Opcode Fuzzy Hash: f37525c496f014b47ca021d889b313c7cd653b8bfb70f3bba3e7d58c114cd050
                                      • Instruction Fuzzy Hash: 09018F72B00B219BC728DA6C985065AB7EBDFC8628314863DD449CB784DF75EC42C7C4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f17266a120d278792262daf08f99ef8077ee3390d2af304ff7328fbd9e48743b
                                      • Instruction ID: 8db23b1577a72e28350fafcd1d8b43b846d8674e2d02a0096089cb99cc9de26b
                                      • Opcode Fuzzy Hash: f17266a120d278792262daf08f99ef8077ee3390d2af304ff7328fbd9e48743b
                                      • Instruction Fuzzy Hash: BE0144717086414FC329EB7DA82506FBFE7EFD122432885AAC04DCB292C9116C0683FA
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cd94d9db8fe3c792703ca3ef17eba5c05278834cf34c5a86462ec098c64f2d88
                                      • Instruction ID: ae6d9c822ff8b6fef756b02e1717600f651218e81763db0b1d1867bbde8881cd
                                      • Opcode Fuzzy Hash: cd94d9db8fe3c792703ca3ef17eba5c05278834cf34c5a86462ec098c64f2d88
                                      • Instruction Fuzzy Hash: F60184B52AC18ACBC61D1B25505507A7F77EBC3609F084C97E04347141CFB16C47CB92
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 58fb2ed2965e8e9e661199fa7eccbace6e250cafbfa1bd7ba3f596eef763522c
                                      • Instruction ID: 9d90e91bfcacbea3b64904db34d8869405bc4334b53d26739fea5350aa0e5a1c
                                      • Opcode Fuzzy Hash: 58fb2ed2965e8e9e661199fa7eccbace6e250cafbfa1bd7ba3f596eef763522c
                                      • Instruction Fuzzy Hash: 2CF0A7F3B08136CF8F22895EA8404EABB9CD9865B874446E2E899DB1C1D7208C01C7E4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 423099471782a5f8d448539c8545fbd2b3eec7166a950bd8a22005c2a9e89891
                                      • Instruction ID: b7e8ae8b31f54d32421b12c1c410f917529c6db2dc96056f3fed1bc4cb13aafa
                                      • Opcode Fuzzy Hash: 423099471782a5f8d448539c8545fbd2b3eec7166a950bd8a22005c2a9e89891
                                      • Instruction Fuzzy Hash: 81F082753047559BC3259A6EBC4445BFFE5FFC55603048A6BD149C7652DA21A80483F1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cac7c327bd72a4243f2e921ebd1ee49477ca9832038eb480777e0725ee52aada
                                      • Instruction ID: 96b659ad7fa2aef3bcc93e6b31015553eed526a9cb1832f98b03dc96aba1df16
                                      • Opcode Fuzzy Hash: cac7c327bd72a4243f2e921ebd1ee49477ca9832038eb480777e0725ee52aada
                                      • Instruction Fuzzy Hash: 5DE0E5363047208FC2161624B4185DEB7A9DB8552130542ABEC45C37C3CA289D0687E2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bc61baeb03092b5b5f6059f3448fcf174f00c506d60c61778b0dae900a2e1dc0
                                      • Instruction ID: 14dc1723a60431b6e5fb6c19156be65ee89261dc97bb9279649c00e8d36a4cbb
                                      • Opcode Fuzzy Hash: bc61baeb03092b5b5f6059f3448fcf174f00c506d60c61778b0dae900a2e1dc0
                                      • Instruction Fuzzy Hash: D5E0D8613DC3655BD702226418216FA675D4FC2895F110563DD05CB282E994890683E3
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6511f3da9aee95ae2b3fa108b23a1e6b4f127ba198226338d62aa2c23340089d
                                      • Instruction ID: 5961d6f2fdba0a8c48c462c1de5b73b22e7cbf17f35d54e03c8479e78f8f30db
                                      • Opcode Fuzzy Hash: 6511f3da9aee95ae2b3fa108b23a1e6b4f127ba198226338d62aa2c23340089d
                                      • Instruction Fuzzy Hash: 6CE04FA07E835997EB4833A8182573E218F0FC1869F500566DD169A284EE909D0582E7
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 450b308e2fee149c474d71798c7edb7870eda1dff391a2b6a19451cd7d753610
                                      • Instruction ID: 5b598b3523449c5eaf5f7555a59c83608efc8f1e184fbbc83afc30306edecc42
                                      • Opcode Fuzzy Hash: 450b308e2fee149c474d71798c7edb7870eda1dff391a2b6a19451cd7d753610
                                      • Instruction Fuzzy Hash: CDE0D83175521657831856EE7C54937BBDEEBC9665B18547AE40FC3343CE608C05C3B1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 239a78276a5f3cedd3197883af2bf467de811edf4e9f0f270080d8614821a657
                                      • Instruction ID: fbb9e2cdcfa4ab7083bdbb6ee42f3ba3dadefcc9567aabfd4df643645c9eadc5
                                      • Opcode Fuzzy Hash: 239a78276a5f3cedd3197883af2bf467de811edf4e9f0f270080d8614821a657
                                      • Instruction Fuzzy Hash: 8DE092B0E0421A9ED780DFA8D81139EBBF4FF04304F10496AC015D7641E7704241CB81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8369ddb73799473c09f398a66e922cb1c1b0fc915e1ca1726c8a811cfa3c772c
                                      • Instruction ID: d8fd2eb0c99de0120957084921abbfa385bbde9aa4d26aca6be516a547694115
                                      • Opcode Fuzzy Hash: 8369ddb73799473c09f398a66e922cb1c1b0fc915e1ca1726c8a811cfa3c772c
                                      • Instruction Fuzzy Hash: D9D02B6115C3055FC73F45B47C61BE33F5A5785310F158983F04589141C59508414291
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3f77a2c3e9b3dddb8bd74b05c6e9e28cd9a63bf76eaedfefde07d078b208a7fa
                                      • Instruction ID: 7949765c5647def0873d57f124c4979354102fb519f8e73d4d57343066e04e95
                                      • Opcode Fuzzy Hash: 3f77a2c3e9b3dddb8bd74b05c6e9e28cd9a63bf76eaedfefde07d078b208a7fa
                                      • Instruction Fuzzy Hash: 10E0ECB0D1020A9FC780EFA9C91575EBBF4BB04204F20896AC415E7241E7B44605CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 501d5926715f137f7297d40bf158d938817453205765d5a478feeec09847faab
                                      • Instruction ID: e18625de0c094e300859ec0dfec5bd1b6bf4c79f3dc50b88319ce3dadf7dacea
                                      • Opcode Fuzzy Hash: 501d5926715f137f7297d40bf158d938817453205765d5a478feeec09847faab
                                      • Instruction Fuzzy Hash: 5EC08CB023830897CB2DD61AAC41A3B335FA7CC704F28C860B00B421488BE1A8018280
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 42931c8c5c544d28e6cbbc563b2f49609e774d2069ddb0938aabd36791a01918
                                      • Instruction ID: f88c1b7bcba7cb0e9378aa1730438ddda9513ed6a4b6805dc5a2a14414a79f10
                                      • Opcode Fuzzy Hash: 42931c8c5c544d28e6cbbc563b2f49609e774d2069ddb0938aabd36791a01918
                                      • Instruction Fuzzy Hash: 46C08C3220E3A08FDA1307A59C26184BF30E90220130504C2E080C61A3CA18880AC3A3
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.543996537.0000000007970000.00000040.00000800.00020000.00000000.sdmp, Offset: 07970000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7970000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3b4a8d5c3f052291cee1614536c0ee1eb4b447c76bcae7d5c1433be0ee7cd8f5
                                      • Instruction ID: 46ae5a50d229d6918411af274633f29dec79c5ada8ed82bf3b9dc3e4e70e7b50
                                      • Opcode Fuzzy Hash: 3b4a8d5c3f052291cee1614536c0ee1eb4b447c76bcae7d5c1433be0ee7cd8f5
                                      • Instruction Fuzzy Hash: FB9002A8774105978E285A21527A5382952EAC53467144C94E00B410518E655401D991
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Execution Graph

                                      Execution Coverage:11.1%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:121
                                      Total number of Limit Nodes:6
                                      execution_graph 16335 8007a00 16336 8007a40 VirtualAllocEx 16335->16336 16338 8007a7d 16336->16338 16353 8007c10 16354 8007c5b ReadProcessMemory 16353->16354 16356 8007c9f 16354->16356 16357 8007af0 16358 8007b38 WriteProcessMemory 16357->16358 16360 8007b8f 16358->16360 16339 8007e08 16340 8007e91 CreateProcessA 16339->16340 16342 8008053 16340->16342 16343 8007868 16344 80078ad SetThreadContext 16343->16344 16346 80078f5 16344->16346 16347 8007788 16348 80077c8 ResumeThread 16347->16348 16350 80077f9 16348->16350 16351 24fc200 DuplicateHandle 16352 24fc296 16351->16352 16361 24fbbd0 GetCurrentProcess 16362 24fbc4a GetCurrentThread 16361->16362 16363 24fbc43 16361->16363 16364 24fbc87 GetCurrentProcess 16362->16364 16365 24fbc80 16362->16365 16363->16362 16366 24fbcbd 16364->16366 16365->16364 16367 24fbce5 GetCurrentThreadId 16366->16367 16368 24fbd16 16367->16368 16369 24f40d0 16370 24f40e2 16369->16370 16371 24f40ee 16370->16371 16375 24f41e0 16370->16375 16380 24f3868 16371->16380 16373 24f410d 16376 24f4205 16375->16376 16384 24f42d1 16376->16384 16388 24f42e0 16376->16388 16381 24f3873 16380->16381 16396 24f5b48 16381->16396 16383 24f6ece 16383->16373 16386 24f42d4 16384->16386 16385 24f43e4 16385->16385 16386->16385 16392 24f38a8 16386->16392 16390 24f42e2 16388->16390 16389 24f43e4 16389->16389 16390->16389 16391 24f38a8 CreateActCtxA 16390->16391 16391->16389 16393 24f5370 CreateActCtxA 16392->16393 16395 24f5433 16393->16395 16397 24f5b53 16396->16397 16400 24f6a88 16397->16400 16399 24f710d 16399->16383 16401 24f6a93 16400->16401 16404 24f6ab8 16401->16404 16403 24f71e2 16403->16399 16405 24f6ac3 16404->16405 16408 24f6ae8 16405->16408 16407 24f72e2 16407->16403 16410 24f6af3 16408->16410 16409 24f7a3c 16409->16407 16410->16409 16412 24fb8f9 16410->16412 16413 24fb8fc 16412->16413 16414 24fb94d 16413->16414 16417 24fbab8 16413->16417 16421 24fbaa9 16413->16421 16414->16409 16418 24fbac5 16417->16418 16420 24fbaff 16418->16420 16425 24fa5fc 16418->16425 16420->16414 16422 24fbab8 16421->16422 16423 24fbaff 16422->16423 16424 24fa5fc 2 API calls 16422->16424 16423->16414 16424->16423 16426 24fa607 16425->16426 16428 24fc7f8 16426->16428 16429 24fbe0c 16426->16429 16428->16428 16430 24fbe17 16429->16430 16431 24fc867 16430->16431 16432 24f6ae8 2 API calls 16430->16432 16436 24fc875 16431->16436 16438 24fc8d1 16431->16438 16432->16431 16433 24fc8a0 16433->16428 16444 24fe5d8 16436->16444 16449 24fe5f0 16436->16449 16439 24fc898 16438->16439 16441 24fc8da 16438->16441 16439->16441 16442 24fe5d8 LoadLibraryExW GetModuleHandleW 16439->16442 16443 24fe5f0 LoadLibraryExW GetModuleHandleW 16439->16443 16440 24fc8a0 16440->16436 16442->16440 16443->16440 16445 24fe5e4 16444->16445 16446 24fe62d 16445->16446 16447 24fea60 LoadLibraryExW GetModuleHandleW 16445->16447 16448 24fea70 LoadLibraryExW GetModuleHandleW 16445->16448 16446->16433 16447->16446 16448->16446 16451 24fe621 16449->16451 16452 24fe66d 16449->16452 16450 24fe62d 16450->16433 16451->16450 16453 24fea60 LoadLibraryExW GetModuleHandleW 16451->16453 16454 24fea70 LoadLibraryExW GetModuleHandleW 16451->16454 16452->16433 16453->16452 16454->16452 16455 24f97f0 16456 24f97ff 16455->16456 16459 24f98d8 16455->16459 16467 24f98e8 16455->16467 16460 24f98dc 16459->16460 16461 24f9913 16460->16461 16475 24f9b61 16460->16475 16479 24f9b70 16460->16479 16461->16456 16462 24f990b 16462->16461 16463 24f9b10 GetModuleHandleW 16462->16463 16464 24f9b3d 16463->16464 16464->16456 16468 24f98fb 16467->16468 16470 24f9913 16468->16470 16473 24f9b61 LoadLibraryExW 16468->16473 16474 24f9b70 LoadLibraryExW 16468->16474 16469 24f990b 16469->16470 16471 24f9b10 GetModuleHandleW 16469->16471 16470->16456 16472 24f9b3d 16471->16472 16472->16456 16473->16469 16474->16469 16476 24f9b64 16475->16476 16477 24f9ba9 16476->16477 16483 24f8c80 16476->16483 16477->16462 16480 24f9b72 16479->16480 16481 24f9ba9 16480->16481 16482 24f8c80 LoadLibraryExW 16480->16482 16481->16462 16482->16481 16484 24f9d50 LoadLibraryExW 16483->16484 16486 24f9dc9 16484->16486 16486->16477

                                      Control-flow Graph

                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 024FBC30
                                      • GetCurrentThread.KERNEL32 ref: 024FBC6D
                                      • GetCurrentProcess.KERNEL32 ref: 024FBCAA
                                      • GetCurrentThreadId.KERNEL32 ref: 024FBD03
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.304478123.00000000024F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_24f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: 4c85e6b951285c3429aa379cb7e7237d47a50debe674948e81fca2b391e2e78c
                                      • Instruction ID: 7551b528af5fab32011b16789d49f7dd28713b2a84f20ababcba0cd73d64241e
                                      • Opcode Fuzzy Hash: 4c85e6b951285c3429aa379cb7e7237d47a50debe674948e81fca2b391e2e78c
                                      • Instruction Fuzzy Hash: 715176B4A002488FDB60CFA9CA487DEBBF1EF89308F20C45EE149A7350D7745885CB66
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 024FBC30
                                      • GetCurrentThread.KERNEL32 ref: 024FBC6D
                                      • GetCurrentProcess.KERNEL32 ref: 024FBCAA
                                      • GetCurrentThreadId.KERNEL32 ref: 024FBD03
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.304478123.00000000024F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_24f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: 1e230b3775e164664be783988294c4b23e0fb50e31060b750335f5ab07093ba7
                                      • Instruction ID: 73fbefc32f74dfcd654d2564169d060c9336221c4daa1d9fdaf469e5453bce16
                                      • Opcode Fuzzy Hash: 1e230b3775e164664be783988294c4b23e0fb50e31060b750335f5ab07093ba7
                                      • Instruction Fuzzy Hash: B45156B49006498FDB54CFAACA487DEBBF1EB88318F20C45EE109A7350D7755885CBA6
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 46 8007e07-8007e9d 49 8007ed6-8007ef6 46->49 50 8007e9f-8007ea9 46->50 55 8007ef8-8007f02 49->55 56 8007f2f-8007f5e 49->56 50->49 51 8007eab-8007ead 50->51 53 8007ed0-8007ed3 51->53 54 8007eaf-8007eb9 51->54 53->49 57 8007ebb 54->57 58 8007ebd-8007ecc 54->58 55->56 60 8007f04-8007f06 55->60 66 8007f60-8007f6a 56->66 67 8007f97-8008051 CreateProcessA 56->67 57->58 58->58 59 8007ece 58->59 59->53 61 8007f08-8007f12 60->61 62 8007f29-8007f2c 60->62 64 8007f14 61->64 65 8007f16-8007f25 61->65 62->56 64->65 65->65 69 8007f27 65->69 66->67 68 8007f6c-8007f6e 66->68 78 8008053-8008059 67->78 79 800805a-80080e0 67->79 70 8007f70-8007f7a 68->70 71 8007f91-8007f94 68->71 69->62 73 8007f7c 70->73 74 8007f7e-8007f8d 70->74 71->67 73->74 74->74 75 8007f8f 74->75 75->71 78->79 89 80080f0-80080f4 79->89 90 80080e2-80080e6 79->90 92 8008104-8008108 89->92 93 80080f6-80080fa 89->93 90->89 91 80080e8 90->91 91->89 95 8008118-800811c 92->95 96 800810a-800810e 92->96 93->92 94 80080fc 93->94 94->92 97 800812e-8008135 95->97 98 800811e-8008124 95->98 96->95 99 8008110 96->99 100 8008137-8008146 97->100 101 800814c 97->101 98->97 99->95 100->101 103 800814d 101->103 103->103
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0800803E
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.316610452.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_8000000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 19dad316e13e19d7188f067805bd1e9fa798a511ea584c219372deae837be2e7
                                      • Instruction ID: 43db1a6ba874bea6ff6b62214fc9c58c728f79abb02a1738ff90e57117299adf
                                      • Opcode Fuzzy Hash: 19dad316e13e19d7188f067805bd1e9fa798a511ea584c219372deae837be2e7
                                      • Instruction Fuzzy Hash: 7A912971D00219DFEB64CF68CC817EEBBB2BF48315F1485A9E809A7280DB759985CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 104 8007e08-8007e9d 106 8007ed6-8007ef6 104->106 107 8007e9f-8007ea9 104->107 112 8007ef8-8007f02 106->112 113 8007f2f-8007f5e 106->113 107->106 108 8007eab-8007ead 107->108 110 8007ed0-8007ed3 108->110 111 8007eaf-8007eb9 108->111 110->106 114 8007ebb 111->114 115 8007ebd-8007ecc 111->115 112->113 117 8007f04-8007f06 112->117 123 8007f60-8007f6a 113->123 124 8007f97-8008051 CreateProcessA 113->124 114->115 115->115 116 8007ece 115->116 116->110 118 8007f08-8007f12 117->118 119 8007f29-8007f2c 117->119 121 8007f14 118->121 122 8007f16-8007f25 118->122 119->113 121->122 122->122 126 8007f27 122->126 123->124 125 8007f6c-8007f6e 123->125 135 8008053-8008059 124->135 136 800805a-80080e0 124->136 127 8007f70-8007f7a 125->127 128 8007f91-8007f94 125->128 126->119 130 8007f7c 127->130 131 8007f7e-8007f8d 127->131 128->124 130->131 131->131 132 8007f8f 131->132 132->128 135->136 146 80080f0-80080f4 136->146 147 80080e2-80080e6 136->147 149 8008104-8008108 146->149 150 80080f6-80080fa 146->150 147->146 148 80080e8 147->148 148->146 152 8008118-800811c 149->152 153 800810a-800810e 149->153 150->149 151 80080fc 150->151 151->149 154 800812e-8008135 152->154 155 800811e-8008124 152->155 153->152 156 8008110 153->156 157 8008137-8008146 154->157 158 800814c 154->158 155->154 156->152 157->158 160 800814d 158->160 160->160
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0800803E
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.316610452.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_8000000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 5bd44df96c00bed1e3dc2bdcf1425d554642e27df8ec959be93e35bc5f187d7b
                                      • Instruction ID: 9f87a394fd7300d26d346a0e4e8aa17f47f9d22f777e7b5fc318f3a27905d252
                                      • Opcode Fuzzy Hash: 5bd44df96c00bed1e3dc2bdcf1425d554642e27df8ec959be93e35bc5f187d7b
                                      • Instruction Fuzzy Hash: B2912971D00219DFEB64CF68CC817EEBBB2BF48315F1485A9E809A7280DB759985CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 161 24f98e8-24f98f0 162 24f98fb-24f98fd 161->162 163 24f98f6 call 24f8c1c 161->163 164 24f98ff 162->164 165 24f9913-24f9917 162->165 163->162 215 24f9905 call 24f9b61 164->215 216 24f9905 call 24f9b70 164->216 166 24f992b-24f996c 165->166 167 24f9919-24f9923 165->167 172 24f996e-24f9976 166->172 173 24f9979-24f9987 166->173 167->166 168 24f990b-24f990d 168->165 169 24f9a48-24f9b08 168->169 210 24f9b0a-24f9b0d 169->210 211 24f9b10-24f9b3b GetModuleHandleW 169->211 172->173 174 24f99ab-24f99ad 173->174 175 24f9989-24f998e 173->175 179 24f99b0-24f99b7 174->179 177 24f9999 175->177 178 24f9990-24f9997 call 24f8c28 175->178 184 24f999b-24f99a9 177->184 178->184 182 24f99b9-24f99c1 179->182 183 24f99c4-24f99cb 179->183 182->183 186 24f99cd-24f99d5 183->186 187 24f99d8-24f99e1 call 24f8c38 183->187 184->179 186->187 192 24f99ee-24f99f3 187->192 193 24f99e3-24f99eb 187->193 194 24f99f5-24f99fc 192->194 195 24f9a11-24f9a15 192->195 193->192 194->195 196 24f99fe-24f9a0e call 24f8c48 call 24f8c58 194->196 217 24f9a18 call 24f9e68 195->217 218 24f9a18 call 24f9e41 195->218 196->195 199 24f9a1b-24f9a1e 201 24f9a41-24f9a47 199->201 202 24f9a20-24f9a3e 199->202 202->201 210->211 212 24f9b3d-24f9b43 211->212 213 24f9b44-24f9b58 211->213 212->213 215->168 216->168 217->199 218->199
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 024F9B2E
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.304478123.00000000024F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_24f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: d0fdee8e38dcc6c1d3be3a1fd4159d4f3a754e808597d14fda91274ca518986c
                                      • Instruction ID: 3bb450f341e0c9b41719fbd8223be79ac31e94a387b2c5775f74b79c16fc6840
                                      • Opcode Fuzzy Hash: d0fdee8e38dcc6c1d3be3a1fd4159d4f3a754e808597d14fda91274ca518986c
                                      • Instruction Fuzzy Hash: 51710270A00B058FD7A4DF2AD450B5BBBF2BB88304F108A2ED68A97B50D735E9458F91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 219 24f5364-24f5366 220 24f536a 219->220 221 24f5368-24f5369 219->221 222 24f536e 220->222 223 24f536c-24f536d 220->223 221->220 224 24f5372-24f5431 CreateActCtxA 222->224 225 24f5370-24f5371 222->225 223->222 227 24f543a-24f5494 224->227 228 24f5433-24f5439 224->228 225->224 235 24f5496-24f5499 227->235 236 24f54a3-24f54a7 227->236 228->227 235->236 237 24f54a9-24f54b5 236->237 238 24f54b8 236->238 237->238 240 24f54b9 238->240 240->240
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 024F5421
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.304478123.00000000024F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_24f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: bef6b2696fc12d13afab0261891ba9fd73af5d142782eb89c29e05911a8c31e1
                                      • Instruction ID: 468cff6020cc843726ffbefaf4c0f3a3aa155ce61667fbadc59640e429965497
                                      • Opcode Fuzzy Hash: bef6b2696fc12d13afab0261891ba9fd73af5d142782eb89c29e05911a8c31e1
                                      • Instruction Fuzzy Hash: 9C411571C00318CEDB64CFA9C844B9EBBB5FF94304F64806AD509BB254D7B59986CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 241 24f38a8-24f5431 CreateActCtxA 245 24f543a-24f5494 241->245 246 24f5433-24f5439 241->246 253 24f5496-24f5499 245->253 254 24f54a3-24f54a7 245->254 246->245 253->254 255 24f54a9-24f54b5 254->255 256 24f54b8 254->256 255->256 258 24f54b9 256->258 258->258
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 024F5421
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.304478123.00000000024F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_24f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: f613f3ca447dfa70be3a94d79cbf1c59641156535318695e3fc5e0e965a4a9dc
                                      • Instruction ID: b84cb584ef0bcbbf37e5bfeb3708027ad24dccc3ad9cf64087f1b99024a273c1
                                      • Opcode Fuzzy Hash: f613f3ca447dfa70be3a94d79cbf1c59641156535318695e3fc5e0e965a4a9dc
                                      • Instruction Fuzzy Hash: 97411370C00318CBDB24DFA9C84479EBBB5BF88304F60806AD519BB254DBB59985CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 259 8007aef-8007b3e 262 8007b40-8007b4c 259->262 263 8007b4e-8007b8d WriteProcessMemory 259->263 262->263 265 8007b96-8007bc6 263->265 266 8007b8f-8007b95 263->266 266->265
                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08007B80
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.316610452.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_8000000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: 55106b0c9e3ab65c4cdc1b6a9e6b02d35a11f5692ad9932affe2084cd8122eee
                                      • Instruction ID: 0b662730ed3aabc0f32eea42c81e735ef380dd91f2f0b304f482286a525b9849
                                      • Opcode Fuzzy Hash: 55106b0c9e3ab65c4cdc1b6a9e6b02d35a11f5692ad9932affe2084cd8122eee
                                      • Instruction Fuzzy Hash: 752148759003099FDB10CFAEC884BEEBBF5FF48314F548429E919A7240C779A954CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 270 8007af0-8007b3e 272 8007b40-8007b4c 270->272 273 8007b4e-8007b8d WriteProcessMemory 270->273 272->273 275 8007b96-8007bc6 273->275 276 8007b8f-8007b95 273->276 276->275
                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08007B80
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.316610452.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_8000000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: efb8717f86828e6df8862cbd3444ddc1900932833cc3ab4ea77dc154b8dec1fc
                                      • Instruction ID: ee5938d8d4b82709d742010a5644f561e1fe181daf57fe78ec749b69c75dc26d
                                      • Opcode Fuzzy Hash: efb8717f86828e6df8862cbd3444ddc1900932833cc3ab4ea77dc154b8dec1fc
                                      • Instruction Fuzzy Hash: A72146759003099FDB10CFAEC884BEEBBF6FF48314F548429E919A7240C779A954CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 280 8007860-80078b3 283 80078c3-80078f3 SetThreadContext 280->283 284 80078b5-80078c1 280->284 286 80078f5-80078fb 283->286 287 80078fc-800792c 283->287 284->283 286->287
                                      APIs
                                      • SetThreadContext.KERNELBASE(?,00000000), ref: 080078E6
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.316610452.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_8000000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: ContextThread
                                      • String ID:
                                      • API String ID: 1591575202-0
                                      • Opcode ID: 93b3850fb82d625f86226106293cb641830ed0126c0d0bd4f2e6ea724dc781d9
                                      • Instruction ID: 29d36c31952e72b22f5e6d9f566757bcb00be30c6b8fddb6b1c5abc0bc694a92
                                      • Opcode Fuzzy Hash: 93b3850fb82d625f86226106293cb641830ed0126c0d0bd4f2e6ea724dc781d9
                                      • Instruction Fuzzy Hash: 3B217875D002098FDB10DFAAC8847EEBBF2EF48324F54842ED419A7240CB789945CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 291 8007c0f-8007c9d ReadProcessMemory 295 8007ca6-8007cd6 291->295 296 8007c9f-8007ca5 291->296 296->295
                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08007C90
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.316610452.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_8000000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: 596ea2add094311f459be6c82f16b1839718d0da08fc734efee585865ec1c3cc
                                      • Instruction ID: 6e1997a2cb58450e3db405c98de8e92b04b5fc1de73ff8a84748202c77a9d13b
                                      • Opcode Fuzzy Hash: 596ea2add094311f459be6c82f16b1839718d0da08fc734efee585865ec1c3cc
                                      • Instruction Fuzzy Hash: 06212875D003099FCB10CFAAC884AEEBBF5FF48314F54842EE559A7240D7799954CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 310 8007c10-8007c9d ReadProcessMemory 313 8007ca6-8007cd6 310->313 314 8007c9f-8007ca5 310->314 314->313
                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08007C90
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.316610452.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_8000000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: 71f9fa5f57a60be2eb0a37449aa5c48be19071cf01a9654e5f271397e7df27eb
                                      • Instruction ID: 6532c05697836d5d0295c87969fd99e1095b511ef8f40c9be138beb5a8ea42ba
                                      • Opcode Fuzzy Hash: 71f9fa5f57a60be2eb0a37449aa5c48be19071cf01a9654e5f271397e7df27eb
                                      • Instruction Fuzzy Hash: EC212875D003099FCB10CFAAC884ADEBBF5FF48314F54842DE559A7240D7799954CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 300 8007868-80078b3 302 80078c3-80078f3 SetThreadContext 300->302 303 80078b5-80078c1 300->303 305 80078f5-80078fb 302->305 306 80078fc-800792c 302->306 303->302 305->306
                                      APIs
                                      • SetThreadContext.KERNELBASE(?,00000000), ref: 080078E6
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.316610452.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_8000000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: ContextThread
                                      • String ID:
                                      • API String ID: 1591575202-0
                                      • Opcode ID: b182a47b0878c127c9d629c055066b9071951978276e54bf0d51fcd7a0072f04
                                      • Instruction ID: e66d19514072bed11ab01b0909e670c45cecfd865921b700ea9012f9fdb14a4b
                                      • Opcode Fuzzy Hash: b182a47b0878c127c9d629c055066b9071951978276e54bf0d51fcd7a0072f04
                                      • Instruction Fuzzy Hash: 2D212575D003098FDB50DFAEC8847AEBBF5AF48324F54842DD459A7240CB79A945CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 323 24fc200-24fc294 DuplicateHandle 324 24fc29d-24fc2ba 323->324 325 24fc296-24fc29c 323->325 325->324
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 024FC287
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.304478123.00000000024F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_24f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 4f7d14877aa3b92f77a8c49d64fcf153272d91f18926e51d8e0ada57d1846b38
                                      • Instruction ID: 1011fff3989fd2f0641a1ff3a8c4b326454fc3711370d667142bb72ceb4c6b55
                                      • Opcode Fuzzy Hash: 4f7d14877aa3b92f77a8c49d64fcf153272d91f18926e51d8e0ada57d1846b38
                                      • Instruction Fuzzy Hash: 1F21F3B5D002089FDB10CFAAD984ADEBFF9FB48324F14841AE914A7350C379A954CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 318 24fc1f8-24fc294 DuplicateHandle 319 24fc29d-24fc2ba 318->319 320 24fc296-24fc29c 318->320 320->319
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 024FC287
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.304478123.00000000024F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_24f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 943c54862b7a4499cb69eb030313b58a46e5421d128042e136d08e415800d4d3
                                      • Instruction ID: fb663f6b8e1cb395e11a13833c7a915644a1bfd0e5c7939ceaa7a7fbaf94f865
                                      • Opcode Fuzzy Hash: 943c54862b7a4499cb69eb030313b58a46e5421d128042e136d08e415800d4d3
                                      • Instruction Fuzzy Hash: 182123B9D002489FDB10CFA9D984AEEBFF5EB48310F14845AE954A3310C378AA54CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 08007A6E
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.316610452.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_8000000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 5a3fb7e9d35b094b334a8a552fa35d3a9a7e2d8d2b5a15ca0b098678f34bf05e
                                      • Instruction ID: a7d63b7e1f98f0f0952e19205b434616c5c74a8094878563af6e5efc5493a193
                                      • Opcode Fuzzy Hash: 5a3fb7e9d35b094b334a8a552fa35d3a9a7e2d8d2b5a15ca0b098678f34bf05e
                                      • Instruction Fuzzy Hash: AF1136759003099BDB10DFAAC8446DEBFF6AB88324F148819E515A7250C779A950CBE1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,024F9BA9,00000800,00000000,00000000), ref: 024F9DBA
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.304478123.00000000024F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_24f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 3e2f79423885bd91eda9f6dc55f043aa15a9d1937f3cb9156bafb8be3b74b122
                                      • Instruction ID: 6c15a36adbaedaf06164fc4cdb4b76a0dcdcaf658d0e35bd19962a51049cbb2f
                                      • Opcode Fuzzy Hash: 3e2f79423885bd91eda9f6dc55f043aa15a9d1937f3cb9156bafb8be3b74b122
                                      • Instruction Fuzzy Hash: 351103B69002099FCB54CF9AC844BDEBBF5AB98324F24842EE515A7300C375A945CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,024F9BA9,00000800,00000000,00000000), ref: 024F9DBA
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.304478123.00000000024F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_24f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: e1284eaf2bb2462d47ec0cb30933b3a9c407a908e6c6c7a50df960f0b1ccb358
                                      • Instruction ID: 3b962263264167a2e18462eee9db9be48ce04559e036f589f3ed85fde3b4d8a1
                                      • Opcode Fuzzy Hash: e1284eaf2bb2462d47ec0cb30933b3a9c407a908e6c6c7a50df960f0b1ccb358
                                      • Instruction Fuzzy Hash: 361103B69002498FDB14CFAAC844BEEFBF5BB98314F24842ED515A7300C375A945CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 08007A6E
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.316610452.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_8000000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: acf35a5dfa8bac4310e2aa433898ef4b74343baef05ecc5f25953bd8174e510f
                                      • Instruction ID: 0a51260c6cc778f9fe7ad32349265de80d309b3d7b6e7d3b74e828c74a6d5ee8
                                      • Opcode Fuzzy Hash: acf35a5dfa8bac4310e2aa433898ef4b74343baef05ecc5f25953bd8174e510f
                                      • Instruction Fuzzy Hash: B31137759002499FDB14CFAAC8446DFBFF6EF88324F148419E415A7250CB7AA954CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.316610452.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_8000000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: 9923171cc41cf3b46e0ee0597247f8a9c03add856b8fb3095961f13e58555bea
                                      • Instruction ID: e086c308a85d163a7ad1f734d9975c87d5143c142ab8fe890df54fb89b76dea5
                                      • Opcode Fuzzy Hash: 9923171cc41cf3b46e0ee0597247f8a9c03add856b8fb3095961f13e58555bea
                                      • Instruction Fuzzy Hash: 12114975D002088BDB20CFAEC8447DFBBF9AF48324F248419D419A7240CB79A944CFE5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.316610452.0000000008000000.00000040.00000800.00020000.00000000.sdmp, Offset: 08000000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_8000000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: be6f3e0b1867ec1913a3414d9f1c32b12b17e237b4069c538ee5ed5082e29497
                                      • Instruction ID: 26d3644e5ad9ecb100f0f9586b5954165d4707daee0098c0b7bb2647983c9eda
                                      • Opcode Fuzzy Hash: be6f3e0b1867ec1913a3414d9f1c32b12b17e237b4069c538ee5ed5082e29497
                                      • Instruction Fuzzy Hash: 781128759003098BDB14DFAEC84479EFBF6AF88324F24841DD419A7240CB79A944CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 024F9B2E
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.304478123.00000000024F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_24f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 8b1b282301c09670a1fbe534655686c06bf022b8fc5b4e5508ff5b1e8ea3cd3d
                                      • Instruction ID: ac965ec3e8fc2057a31bb70e7880e4d6c61a5828b9f49b71212f3caa4c9ed32f
                                      • Opcode Fuzzy Hash: 8b1b282301c09670a1fbe534655686c06bf022b8fc5b4e5508ff5b1e8ea3cd3d
                                      • Instruction Fuzzy Hash: 101110B6D002098FCB20CF9AC844BDFFBF5AF88328F14841AD419A7204C379A545CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000005.00000002.304478123.00000000024F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_24f0000_nzCzLT1rR6.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1a2841f3726f13e9b626d7245a96815f96a68cb5addd8cc7ed1faaf7ab76eff5
                                      • Instruction ID: 4b4bfa3108029faf82d8802f44fba24c7a9c1793d6f0a7877b8824c318574c58
                                      • Opcode Fuzzy Hash: 1a2841f3726f13e9b626d7245a96815f96a68cb5addd8cc7ed1faaf7ab76eff5
                                      • Instruction Fuzzy Hash: B73147349093F8DFD3AA4B3848954D73F21DF8735A34A14CBC6818B837C20A458BCB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%