Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
kcnXZ6yXoo.exe

Overview

General Information

Sample Name:kcnXZ6yXoo.exe
Analysis ID:796220
MD5:cffcaceccd0c05762dc335f58a2f0932
SHA1:45fbb9ddf062f8b64ba3b8ace48767991517fa50
SHA256:bdfc24d604f256170914e2f360d8b6ed30182fe8682fc11aa136dec7a5fb1876
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • kcnXZ6yXoo.exe (PID: 5256 cmdline: C:\Users\user\Desktop\kcnXZ6yXoo.exe MD5: CFFCACECCD0C05762DC335F58A2F0932)
    • kcnXZ6yXoo.exe (PID: 5764 cmdline: C:\Users\user\Desktop\kcnXZ6yXoo.exe MD5: CFFCACECCD0C05762DC335F58A2F0932)
    • kcnXZ6yXoo.exe (PID: 3396 cmdline: C:\Users\user\Desktop\kcnXZ6yXoo.exe MD5: CFFCACECCD0C05762DC335F58A2F0932)
      • schtasks.exe (PID: 6084 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp908E.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 1092 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp9283.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 1252 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • MpCmdRun.exe (PID: 1092 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: A267555174BFA53844371226F482B86B)
        • conhost.exe (PID: 3300 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • kcnXZ6yXoo.exe (PID: 5800 cmdline: C:\Users\user\Desktop\kcnXZ6yXoo.exe 0 MD5: CFFCACECCD0C05762DC335F58A2F0932)
    • kcnXZ6yXoo.exe (PID: 5872 cmdline: C:\Users\user\Desktop\kcnXZ6yXoo.exe MD5: CFFCACECCD0C05762DC335F58A2F0932)
    • kcnXZ6yXoo.exe (PID: 2004 cmdline: C:\Users\user\Desktop\kcnXZ6yXoo.exe MD5: CFFCACECCD0C05762DC335F58A2F0932)
  • dhcpmon.exe (PID: 5920 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: CFFCACECCD0C05762DC335F58A2F0932)
    • dhcpmon.exe (PID: 2284 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: CFFCACECCD0C05762DC335F58A2F0932)
  • dhcpmon.exe (PID: 5904 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: CFFCACECCD0C05762DC335F58A2F0932)
    • dhcpmon.exe (PID: 1364 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: CFFCACECCD0C05762DC335F58A2F0932)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "be28fce4-4930-4ffe-96ed-0110cf99", "Group": "SecureKMT", "Domain1": "tzitziklishop.ddns.net", "Domain2": "127.0.0.1", "Port": 1665, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0x2205:$x1: NanoCore.ClientPluginHost
  • 0x223e:$x2: IClientNetworkHost
00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
  • 0x2205:$x2: NanoCore.ClientPluginHost
  • 0x2320:$s4: PipeCreated
  • 0x221f:$s5: IClientLoggingHost
00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x227f:$x2: NanoCore.ClientPlugin
  • 0x2205:$x3: NanoCore.ClientPluginHost
  • 0x2295:$i3: IClientNetwork
  • 0x221f:$i6: IClientLoggingHost
  • 0x223e:$i7: IClientNetworkHost
  • 0x1f9f:$s1: ClientPlugin
  • 0x2288:$s1: ClientPlugin
00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x2205:$a1: NanoCore.ClientPluginHost
  • 0x227f:$a2: NanoCore.ClientPlugin
  • 0x29a0:$b7: LogClientException
  • 0x221f:$b9: IClientLoggingHost
00000008.00000002.376686559.0000000002EB0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    Click to see the 106 entries
    SourceRuleDescriptionAuthorStrings
    2.2.kcnXZ6yXoo.exe.3135440.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
    • 0x2dbb:$x1: NanoCore.ClientPluginHost
    • 0x2de5:$x2: IClientNetworkHost
    2.2.kcnXZ6yXoo.exe.3135440.3.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
    • 0x2dbb:$x2: NanoCore.ClientPluginHost
    • 0x4c6b:$s4: PipeCreated
    2.2.kcnXZ6yXoo.exe.3135440.3.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0x2d96:$x2: NanoCore.ClientPlugin
    • 0x2dbb:$x3: NanoCore.ClientPluginHost
    • 0x2d87:$i3: IClientNetwork
    • 0x2dac:$i4: IClientAppHost
    • 0x2dd5:$i5: IClientDataHost
    • 0x2de5:$i7: IClientNetworkHost
    • 0x2df8:$i9: IClientNameObjectCollection
    • 0x2e1d:$i10: IClientReadOnlyNameObjectCollection
    • 0x2bce:$s1: ClientPlugin
    • 0x2d9f:$s1: ClientPlugin
    2.2.kcnXZ6yXoo.exe.3135440.3.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0x2dbb:$a1: NanoCore.ClientPluginHost
    • 0x2d96:$a2: NanoCore.ClientPlugin
    • 0x6758:$b1: get_BuilderSettings
    • 0x2dac:$b4: IClientAppHost
    2.2.kcnXZ6yXoo.exe.5b40000.26.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
    • 0x2dbb:$x1: NanoCore.ClientPluginHost
    • 0x2de5:$x2: IClientNetworkHost
    Click to see the 308 entries

    AV Detection

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\kcnXZ6yXoo.exe, ProcessId: 3396, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    E-Banking Fraud

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\kcnXZ6yXoo.exe, ProcessId: 3396, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Persistence and Installation Behavior

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp908E.tmp, CommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp908E.tmp, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\kcnXZ6yXoo.exe, ParentImage: C:\Users\user\Desktop\kcnXZ6yXoo.exe, ParentProcessId: 3396, ParentProcessName: kcnXZ6yXoo.exe, ProcessCommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp908E.tmp, ProcessId: 6084, ProcessName: schtasks.exe

    Stealing of Sensitive Information

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\kcnXZ6yXoo.exe, ProcessId: 3396, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Remote Access Functionality

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\kcnXZ6yXoo.exe, ProcessId: 3396, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
    Timestamp:192.168.2.545.12.253.264972516652816766 02/01/23-18:26:06.563289
    SID:2816766
    Source Port:49725
    Destination Port:1665
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.545.12.253.264971916652816766 02/01/23-18:25:38.356322
    SID:2816766
    Source Port:49719
    Destination Port:1665
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.545.12.253.264972216652816766 02/01/23-18:25:51.759928
    SID:2816766
    Source Port:49722
    Destination Port:1665
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.545.12.253.264971516652816766 02/01/23-18:25:18.162168
    SID:2816766
    Source Port:49715
    Destination Port:1665
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.545.12.253.264972616652816718 02/01/23-18:26:14.335036
    SID:2816718
    Source Port:49726
    Destination Port:1665
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.545.12.253.264970116652816766 02/01/23-18:24:35.085073
    SID:2816766
    Source Port:49701
    Destination Port:1665
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.545.12.253.264971616652816718 02/01/23-18:25:24.426541
    SID:2816718
    Source Port:49716
    Destination Port:1665
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.545.12.253.264970316652816766 02/01/23-18:24:53.542008
    SID:2816766
    Source Port:49703
    Destination Port:1665
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.545.12.253.264972116652816766 02/01/23-18:25:45.484001
    SID:2816766
    Source Port:49721
    Destination Port:1665
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.545.12.253.264972616652816766 02/01/23-18:26:14.335036
    SID:2816766
    Source Port:49726
    Destination Port:1665
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:45.12.253.26192.168.2.51665497042810290 02/01/23-18:25:00.449651
    SID:2810290
    Source Port:1665
    Destination Port:49704
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.545.12.253.264971316652816766 02/01/23-18:25:12.038226
    SID:2816766
    Source Port:49713
    Destination Port:1665
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.545.12.253.264971616652816766 02/01/23-18:25:24.426541
    SID:2816766
    Source Port:49716
    Destination Port:1665
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.545.12.253.264972316652816766 02/01/23-18:25:58.538683
    SID:2816766
    Source Port:49723
    Destination Port:1665
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.545.12.253.264971816652816766 02/01/23-18:25:32.163358
    SID:2816766
    Source Port:49718
    Destination Port:1665
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.545.12.253.264970416652816766 02/01/23-18:25:02.005236
    SID:2816766
    Source Port:49704
    Destination Port:1665
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.545.12.253.264970216652816766 02/01/23-18:24:42.851032
    SID:2816766
    Source Port:49702
    Destination Port:1665
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: kcnXZ6yXoo.exeReversingLabs: Detection: 25%
    Source: kcnXZ6yXoo.exeVirustotal: Detection: 32%Perma Link
    Source: tzitziklishop.ddns.netAvira URL Cloud: Label: malware
    Source: tzitziklishop.ddns.netVirustotal: Detection: 12%Perma Link
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 25%
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.58e0000.23.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4b6a44a.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.58e0000.23.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4a867ef.14.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4a92c1c.17.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.58e4629.24.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.kcnXZ6yXoo.exe.3a795d0.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4a9ba4d.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4b738a9.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4cd4449.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000000.00000002.332268790.0000000003E69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.411231497.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.432812642.0000000002AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.599210751.00000000058E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.433432436.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.435644286.0000000003A84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: kcnXZ6yXoo.exe PID: 5256, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: kcnXZ6yXoo.exe PID: 3396, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2284, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: kcnXZ6yXoo.exe PID: 2004, type: MEMORYSTR
    Source: kcnXZ6yXoo.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
    Source: 2.2.kcnXZ6yXoo.exe.58e0000.23.unpackAvira: Label: TR/NanoCore.fadte
    Source: 10.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 0000000A.00000002.432812642.0000000002AE1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "be28fce4-4930-4ffe-96ed-0110cf99", "Group": "SecureKMT", "Domain1": "tzitziklishop.ddns.net", "Domain2": "127.0.0.1", "Port": 1665, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
    Source: kcnXZ6yXoo.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: kcnXZ6yXoo.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.603445677.00000000075F0000.00000004.08000000.00040000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.603581661.0000000007610000.00000004.08000000.00040000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.603254412.0000000007490000.00000004.08000000.00040000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004C3A000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.603323053.00000000074A0000.00000004.08000000.00040000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.603631836.0000000007620000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: kcnXZ6yXoo.exe, 00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]

    Networking

    barindex
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49701 -> 45.12.253.26:1665
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49702 -> 45.12.253.26:1665
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49703 -> 45.12.253.26:1665
    Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 45.12.253.26:1665 -> 192.168.2.5:49704
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49704 -> 45.12.253.26:1665
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49713 -> 45.12.253.26:1665
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49715 -> 45.12.253.26:1665
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49716 -> 45.12.253.26:1665
    Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.5:49716 -> 45.12.253.26:1665
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49718 -> 45.12.253.26:1665
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49719 -> 45.12.253.26:1665
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49721 -> 45.12.253.26:1665
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49722 -> 45.12.253.26:1665
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49723 -> 45.12.253.26:1665
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49725 -> 45.12.253.26:1665
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49726 -> 45.12.253.26:1665
    Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.5:49726 -> 45.12.253.26:1665
    Source: Malware configuration extractorURLs: tzitziklishop.ddns.net
    Source: Malware configuration extractorURLs: 127.0.0.1
    Source: unknownDNS query: name: tzitziklishop.ddns.net
    Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
    Source: Joe Sandbox ViewIP Address: 45.12.253.26 45.12.253.26
    Source: global trafficTCP traffic: 192.168.2.5:49701 -> 45.12.253.26:1665
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.603631836.0000000007620000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://google.com
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.00000000030B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: kcnXZ6yXoo.exe, 00000000.00000003.326231202.00000000059E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.agfamonotype.Z
    Source: kcnXZ6yXoo.exe, 00000000.00000003.312619033.00000000059F9000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
    Source: kcnXZ6yXoo.exe, 00000000.00000003.318667992.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318511932.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318481734.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.326231202.00000000059FF000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318435369.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318547414.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318631646.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
    Source: kcnXZ6yXoo.exe, 00000000.00000003.318349413.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318831764.00000000059FA000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318667992.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318511932.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318481734.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318435369.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318276697.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318547414.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318320632.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318631646.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com%
    Source: kcnXZ6yXoo.exe, 00000000.00000003.318349413.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318667992.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318511932.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318481734.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318435369.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318547414.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318631646.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com.
    Source: kcnXZ6yXoo.exe, 00000000.00000003.317495074.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317720307.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317567364.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317368441.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317304521.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317844075.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317767247.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317955353.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317221145.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317147616.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317415466.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317268864.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
    Source: kcnXZ6yXoo.exe, 00000000.00000003.318349413.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318481734.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318435369.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318276697.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318320632.0000000005A02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlP(
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
    Source: kcnXZ6yXoo.exe, 00000000.00000003.317767247.00000000059F4000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317720307.00000000059F4000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317844075.00000000059F4000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317955353.00000000059F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html:
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
    Source: kcnXZ6yXoo.exe, 00000000.00000003.318196897.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318349413.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318137112.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318831764.00000000059FA000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318667992.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318511932.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318481734.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317495074.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318930233.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317720307.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317567364.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317368441.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318435369.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317304521.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318276697.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318547414.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317844075.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317767247.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317955353.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318320632.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317221145.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
    Source: kcnXZ6yXoo.exe, 00000000.00000003.317844075.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317767247.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317955353.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFX
    Source: kcnXZ6yXoo.exe, 00000000.00000003.317099709.0000000005A02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comTTF/
    Source: kcnXZ6yXoo.exe, 00000000.00000003.318481734.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318435369.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comals/
    Source: kcnXZ6yXoo.exe, 00000000.00000003.318831764.00000000059FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcom.
    Source: kcnXZ6yXoo.exe, 00000000.00000003.317720307.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317844075.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317767247.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317955353.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
    Source: kcnXZ6yXoo.exe, 00000000.00000003.318667992.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdiaF
    Source: kcnXZ6yXoo.exe, 00000000.00000003.326231202.00000000059FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comlvfetf
    Source: kcnXZ6yXoo.exe, 00000000.00000003.318349413.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318831764.00000000059FA000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318667992.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318511932.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318481734.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318435369.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318547414.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318631646.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comsiva
    Source: kcnXZ6yXoo.exe, 00000000.00000003.317495074.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317720307.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317567364.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317368441.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317304521.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317014695.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317844075.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317767247.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317955353.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317221145.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317147616.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317053909.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317099709.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317415466.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317268864.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comt
    Source: kcnXZ6yXoo.exe, 00000000.00000003.318196897.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318137112.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318276697.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317844075.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317767247.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317955353.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comtoedA
    Source: kcnXZ6yXoo.exe, 00000000.00000003.317495074.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317720307.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317567364.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317368441.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317304521.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317844075.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317767247.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317955353.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317221145.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317147616.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317053909.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317099709.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317415466.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317268864.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comtuo
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
    Source: kcnXZ6yXoo.exe, 00000000.00000003.311803735.00000000059E2000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
    Source: kcnXZ6yXoo.exe, 00000000.00000003.311803735.00000000059E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
    Source: kcnXZ6yXoo.exe, 00000000.00000003.311803735.00000000059E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnhtRE_
    Source: kcnXZ6yXoo.exe, 00000000.00000003.311803735.00000000059E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cntu
    Source: kcnXZ6yXoo.exe, 00000000.00000003.319447929.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.319321867.0000000005A00000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.319384991.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
    Source: kcnXZ6yXoo.exe, 00000000.00000003.319321867.0000000005A00000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.319384991.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
    Source: kcnXZ6yXoo.exe, 00000000.00000003.315832173.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
    Source: kcnXZ6yXoo.exe, 00000000.00000003.316321496.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315020936.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315364448.00000000059F8000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316162313.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315960320.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316285042.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314102705.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315865361.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315507955.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316031658.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314576431.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316082284.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315146785.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315690017.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315428401.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316124895.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315917112.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314795179.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315726257.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314305088.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315644708.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/%
    Source: kcnXZ6yXoo.exe, 00000000.00000003.315020936.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315364448.00000000059F8000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315865361.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315507955.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314576431.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315146785.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315690017.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315428401.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314795179.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315726257.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314305088.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315644708.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315327758.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315832173.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/.
    Source: kcnXZ6yXoo.exe, 00000000.00000003.315020936.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315364448.00000000059F8000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315507955.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315146785.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315428401.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314795179.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315644708.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315327758.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/3
    Source: kcnXZ6yXoo.exe, 00000000.00000003.315020936.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315364448.00000000059F8000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314102705.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315865361.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315507955.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314576431.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315146785.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315690017.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315428401.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314795179.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315726257.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314305088.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315644708.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315327758.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315832173.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/A
    Source: kcnXZ6yXoo.exe, 00000000.00000003.315020936.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314102705.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314576431.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315146785.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314795179.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314305088.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315327758.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/X
    Source: kcnXZ6yXoo.exe, 00000000.00000003.315020936.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315364448.00000000059F8000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316162313.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315960320.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315865361.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315507955.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316031658.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314576431.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316082284.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315146785.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315690017.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315428401.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316124895.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315917112.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314795179.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315726257.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314305088.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315644708.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315327758.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315832173.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
    Source: kcnXZ6yXoo.exe, 00000000.00000003.315020936.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315364448.00000000059F8000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316162313.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315960320.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315865361.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315507955.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316031658.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316082284.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315146785.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315690017.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315428401.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316124895.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315917112.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314795179.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315726257.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315644708.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316214959.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315327758.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315832173.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/
    Source: kcnXZ6yXoo.exe, 00000000.00000003.315020936.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315364448.00000000059F8000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314102705.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315507955.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314576431.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315146785.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315428401.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314795179.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314305088.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315644708.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315327758.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
    Source: kcnXZ6yXoo.exe, 00000000.00000003.315364448.00000000059F8000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315507955.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315428401.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315644708.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/X
    Source: kcnXZ6yXoo.exe, 00000000.00000003.315364448.00000000059F8000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315865361.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315507955.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315690017.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315428401.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315726257.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315644708.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315832173.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/t
    Source: kcnXZ6yXoo.exe, 00000000.00000003.314102705.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314576431.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314305088.0000000005A03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/~
    Source: kcnXZ6yXoo.exe, 00000000.00000003.308981659.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
    Source: kcnXZ6yXoo.exe, 00000000.00000003.316285042.00000000059F6000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316444935.00000000059EF000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316031658.00000000059F6000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315690017.00000000059F4000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316410028.00000000059EE000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316514139.00000000059EF000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315917112.00000000059F6000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315726257.00000000059F4000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315865361.00000000059F4000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316321496.00000000059F6000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316162313.00000000059F6000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316214959.00000000059F6000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316551502.00000000059F4000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315832173.00000000059F4000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316368311.00000000059EE000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316124895.00000000059F6000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315960320.00000000059F4000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316082284.00000000059F6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.comn
    Source: kcnXZ6yXoo.exe, 00000000.00000003.315644708.00000000059F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.comrm
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
    Source: kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
    Source: unknownDNS traffic detected: queries for: tzitziklishop.ddns.net
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.58e0000.23.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4b6a44a.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.58e0000.23.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4a867ef.14.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4a92c1c.17.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.58e4629.24.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.kcnXZ6yXoo.exe.3a795d0.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4a9ba4d.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4b738a9.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4cd4449.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000000.00000002.332268790.0000000003E69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.411231497.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.432812642.0000000002AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.599210751.00000000058E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.433432436.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.435644286.0000000003A84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: kcnXZ6yXoo.exe PID: 5256, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: kcnXZ6yXoo.exe PID: 3396, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2284, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: kcnXZ6yXoo.exe PID: 2004, type: MEMORYSTR

    System Summary

    barindex
    Source: 2.2.kcnXZ6yXoo.exe.3135440.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.3135440.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.3135440.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.5b40000.26.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.5b40000.26.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.5b40000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.7a20000.37.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.7a20000.37.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.7a20000.37.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.58e0000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.58e0000.23.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.58e0000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4a54d0d.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4a54d0d.20.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4a54d0d.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4a48ad9.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4a48ad9.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4a48ad9.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4a9ba4d.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4a9ba4d.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4a9ba4d.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.kcnXZ6yXoo.exe.2b95c40.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.7450000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.7450000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.7450000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.7a2e8a4.38.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.7a2e8a4.38.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.7a2e8a4.38.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.7490000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.7490000.28.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.7490000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4a92c1c.17.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4a92c1c.17.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4a92c1c.17.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.7610000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.7610000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.7610000.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4b4cdfc.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4b4cdfc.16.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4b4cdfc.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.3141688.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.3141688.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.3141688.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.7620000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.7620000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.7620000.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4c44b26.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4c44b26.18.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4c44b26.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.5b40000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.5b40000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.5b40000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.75f0000.30.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.75f0000.30.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.75f0000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 10.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 10.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 10.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 10.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.7490000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.7490000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.7490000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.79f0000.34.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.79f0000.34.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.79f0000.34.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.74a0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.74a0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.74a0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4a48ad9.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4a48ad9.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4a48ad9.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.7a60000.39.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.7a60000.39.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.7a60000.39.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.79f0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.79f0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.79f0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4c3bcf7.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4c3bcf7.15.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4c3bcf7.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4a867ef.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4a867ef.14.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4a867ef.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4b6a44a.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4b6a44a.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4b6a44a.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.kcnXZ6yXoo.exe.4b6a44a.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.7a20000.37.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.7a20000.37.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.7a20000.37.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.7600000.31.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.7600000.31.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.7600000.31.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.57e0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.57e0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.57e0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.7a24c9f.36.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.7a24c9f.36.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.7a24c9f.36.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.58e0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.58e0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.58e0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4a867ef.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4a867ef.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4a867ef.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.kcnXZ6yXoo.exe.4a867ef.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4a54d0d.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4a54d0d.20.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4a54d0d.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 8.2.dhcpmon.exe.2ec5c74.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
    Source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4a6933a.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4a6933a.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4a6933a.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 10.2.dhcpmon.exe.2b49658.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 10.2.dhcpmon.exe.2b49658.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 10.2.dhcpmon.exe.2b49658.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 12.2.kcnXZ6yXoo.exe.2a79550.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 12.2.kcnXZ6yXoo.exe.2a79550.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 12.2.kcnXZ6yXoo.exe.2a79550.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.7620000.33.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.7620000.33.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.7620000.33.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4b4cdfc.16.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4b4cdfc.16.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4b4cdfc.16.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4a92c1c.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4a92c1c.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4a92c1c.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.kcnXZ6yXoo.exe.4a92c1c.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4c52f56.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4c52f56.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4c52f56.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 10.2.dhcpmon.exe.3b2b7be.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 10.2.dhcpmon.exe.3b2b7be.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 10.2.dhcpmon.exe.3b2b7be.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.7600000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.7600000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.7600000.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.7450000.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.7450000.27.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.7450000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.7a60000.39.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.7a60000.39.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.7a60000.39.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.7a10000.35.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4ce864c.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4ce864c.11.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4ce864c.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.7a10000.35.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.7a10000.35.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.3155cc4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.3155cc4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.3155cc4.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.kcnXZ6yXoo.exe.3155cc4.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4c3bcf7.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4c3bcf7.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4c3bcf7.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.kcnXZ6yXoo.exe.4c3bcf7.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.75f0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.75f0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.75f0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.58e4629.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.58e4629.24.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.58e4629.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4c44b26.18.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4c44b26.18.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4c44b26.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.7a10000.35.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.7a10000.35.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.7a10000.35.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 12.2.kcnXZ6yXoo.exe.3a795d0.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 12.2.kcnXZ6yXoo.exe.3a795d0.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 12.2.kcnXZ6yXoo.exe.3a795d0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.3141688.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.3141688.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.3141688.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.kcnXZ6yXoo.exe.3141688.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4c52f56.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4c52f56.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4c52f56.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.3135440.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.3135440.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.3135440.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.kcnXZ6yXoo.exe.3135440.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.kcnXZ6yXoo.exe.4a9ba4d.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4a9ba4d.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4a9ba4d.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.kcnXZ6yXoo.exe.4a9ba4d.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4b738a9.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.4b738a9.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4b738a9.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.kcnXZ6yXoo.exe.4b738a9.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.30dca28.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 2.2.kcnXZ6yXoo.exe.30dca28.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.30dca28.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4cd4449.21.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4cd4449.21.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.kcnXZ6yXoo.exe.4cd4449.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4ce864c.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4ce864c.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.kcnXZ6yXoo.exe.4ce864c.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000C.00000002.435644286.0000000003A6F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.603581661.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000002.00000002.603581661.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.603581661.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000002.332268790.0000000003E69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000002.332268790.0000000003E69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000002.332268790.0000000003E69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.587607897.0000000004BDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.603254412.0000000007490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000002.00000002.603254412.0000000007490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.603254412.0000000007490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000A.00000002.411231497.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0000000A.00000002.411231497.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000A.00000002.411231497.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.603323053.00000000074A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000002.00000002.603323053.00000000074A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.603323053.00000000074A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.604138192.0000000007A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000002.00000002.604138192.0000000007A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.604138192.0000000007A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.602903443.0000000007450000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000002.00000002.602903443.0000000007450000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.602903443.0000000007450000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.587607897.0000000004C3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000002.00000002.587607897.0000000004C3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000A.00000002.432812642.0000000002AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000A.00000002.432812642.0000000002AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.598984140.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000002.00000002.598984140.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.598984140.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.599210751.00000000058E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000002.00000002.599210751.00000000058E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.599210751.00000000058E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000003.352344593.0000000001288000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.603445677.00000000075F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000002.00000002.603445677.00000000075F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.603445677.00000000075F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.599845120.0000000005B40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000002.00000002.599845120.0000000005B40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.599845120.0000000005B40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.603926095.00000000079F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000002.00000002.603926095.00000000079F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.603926095.00000000079F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.604219449.0000000007A20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000002.00000002.604219449.0000000007A20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.604219449.0000000007A20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.578455701.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.603631836.0000000007620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000002.00000002.603631836.0000000007620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.603631836.0000000007620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000C.00000002.433432436.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000C.00000002.433432436.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.587607897.0000000004B4C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.604565341.0000000007A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000002.00000002.604565341.0000000007A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.604565341.0000000007A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000A.00000002.434966346.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000C.00000002.435644286.0000000003A84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: kcnXZ6yXoo.exe PID: 5256, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: Process Memory Space: kcnXZ6yXoo.exe PID: 5256, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: kcnXZ6yXoo.exe PID: 5256, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: kcnXZ6yXoo.exe PID: 3396, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: kcnXZ6yXoo.exe PID: 3396, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: dhcpmon.exe PID: 2284, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: Process Memory Space: dhcpmon.exe PID: 2284, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: dhcpmon.exe PID: 2284, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: kcnXZ6yXoo.exe PID: 2004, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: kcnXZ6yXoo.exe PID: 2004, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: kcnXZ6yXoo.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 2.2.kcnXZ6yXoo.exe.3135440.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.3135440.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.3135440.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.3135440.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.5b40000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.5b40000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.5b40000.26.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.5b40000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.7a20000.37.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7a20000.37.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7a20000.37.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.7a20000.37.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.58e0000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.58e0000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.58e0000.23.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.58e0000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4a54d0d.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4a54d0d.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4a54d0d.20.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4a54d0d.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4a48ad9.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4a48ad9.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4a48ad9.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4a48ad9.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4a9ba4d.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4a9ba4d.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4a9ba4d.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4a9ba4d.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.kcnXZ6yXoo.exe.2b95c40.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
    Source: 2.2.kcnXZ6yXoo.exe.7450000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7450000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7450000.27.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.7450000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.7a2e8a4.38.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7a2e8a4.38.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7a2e8a4.38.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.7a2e8a4.38.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.7490000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7490000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7490000.28.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.7490000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4a92c1c.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4a92c1c.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4a92c1c.17.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4a92c1c.17.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.7610000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7610000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7610000.32.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.7610000.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4b4cdfc.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4b4cdfc.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4b4cdfc.16.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4b4cdfc.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.3141688.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.3141688.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.3141688.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.3141688.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.7620000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7620000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7620000.33.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.7620000.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4c44b26.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4c44b26.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4c44b26.18.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4c44b26.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.5b40000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.5b40000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.5b40000.26.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.5b40000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.75f0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.75f0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.75f0000.30.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.75f0000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 10.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 10.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 10.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.7490000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7490000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7490000.28.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.7490000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.79f0000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.79f0000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.79f0000.34.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.79f0000.34.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.74a0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.74a0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.74a0000.29.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.74a0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4a48ad9.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4a48ad9.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4a48ad9.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4a48ad9.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.7a60000.39.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7a60000.39.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7a60000.39.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.7a60000.39.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.79f0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.79f0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.79f0000.34.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.79f0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4c3bcf7.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4c3bcf7.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4c3bcf7.15.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4c3bcf7.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4a867ef.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4a867ef.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4a867ef.14.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4a867ef.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4b6a44a.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4b6a44a.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4b6a44a.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4b6a44a.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4b6a44a.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.7a20000.37.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7a20000.37.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7a20000.37.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.7a20000.37.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.7600000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7600000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7600000.31.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.7600000.31.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.57e0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.57e0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.57e0000.22.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.57e0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.7a24c9f.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7a24c9f.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7a24c9f.36.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.7a24c9f.36.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.58e0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.58e0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.58e0000.23.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.58e0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4a867ef.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4a867ef.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4a867ef.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4a867ef.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4a54d0d.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4a54d0d.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4a54d0d.20.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4a54d0d.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 8.2.dhcpmon.exe.2ec5c74.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
    Source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4a6933a.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4a6933a.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4a6933a.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4a6933a.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 10.2.dhcpmon.exe.2b49658.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.dhcpmon.exe.2b49658.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.dhcpmon.exe.2b49658.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 10.2.dhcpmon.exe.2b49658.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 12.2.kcnXZ6yXoo.exe.2a79550.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 12.2.kcnXZ6yXoo.exe.2a79550.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 12.2.kcnXZ6yXoo.exe.2a79550.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 12.2.kcnXZ6yXoo.exe.2a79550.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.7620000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7620000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7620000.33.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.7620000.33.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4b4cdfc.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4b4cdfc.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4b4cdfc.16.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4b4cdfc.16.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4a92c1c.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4a92c1c.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4a92c1c.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4a92c1c.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4c52f56.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4c52f56.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4c52f56.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4c52f56.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 10.2.dhcpmon.exe.3b2b7be.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.dhcpmon.exe.3b2b7be.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 10.2.dhcpmon.exe.3b2b7be.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 10.2.dhcpmon.exe.3b2b7be.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.7600000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7600000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7600000.31.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.7600000.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.7450000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7450000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7450000.27.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.7450000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.7a60000.39.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7a60000.39.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7a60000.39.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.7a60000.39.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.7a10000.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7a10000.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4ce864c.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4ce864c.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4ce864c.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4ce864c.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.7a10000.35.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.7a10000.35.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.3155cc4.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.3155cc4.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.3155cc4.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.3155cc4.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4c3bcf7.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4c3bcf7.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4c3bcf7.15.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4c3bcf7.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4c3bcf7.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.75f0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.75f0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.75f0000.30.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.75f0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.58e4629.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.58e4629.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.58e4629.24.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.58e4629.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4c44b26.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4c44b26.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4c44b26.18.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4c44b26.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.7a10000.35.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7a10000.35.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.7a10000.35.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.7a10000.35.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 12.2.kcnXZ6yXoo.exe.3a795d0.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 12.2.kcnXZ6yXoo.exe.3a795d0.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 12.2.kcnXZ6yXoo.exe.3a795d0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 12.2.kcnXZ6yXoo.exe.3a795d0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.3141688.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.3141688.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.3141688.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.3141688.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4c52f56.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4c52f56.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4c52f56.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4c52f56.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.3135440.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.3135440.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.3135440.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.3135440.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4a9ba4d.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4a9ba4d.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4a9ba4d.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4a9ba4d.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4b738a9.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4b738a9.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.4b738a9.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4b738a9.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4b738a9.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.30dca28.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.30dca28.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.kcnXZ6yXoo.exe.30dca28.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.30dca28.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4cd4449.21.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4cd4449.21.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4cd4449.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4ce864c.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4ce864c.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4ce864c.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000C.00000002.435644286.0000000003A6F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.603581661.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.603581661.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.603581661.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.603581661.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000002.332268790.0000000003E69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000002.332268790.0000000003E69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000002.332268790.0000000003E69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.587607897.0000000004BDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.603254412.0000000007490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.603254412.0000000007490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.603254412.0000000007490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.603254412.0000000007490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000A.00000002.411231497.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000A.00000002.411231497.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000A.00000002.411231497.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.603323053.00000000074A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.603323053.00000000074A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.603323053.00000000074A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.603323053.00000000074A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.604138192.0000000007A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.604138192.0000000007A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.604138192.0000000007A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.604138192.0000000007A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.602903443.0000000007450000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.602903443.0000000007450000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.602903443.0000000007450000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.602903443.0000000007450000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.587607897.0000000004C3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000002.00000002.587607897.0000000004C3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000A.00000002.432812642.0000000002AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000A.00000002.432812642.0000000002AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.598984140.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.598984140.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.598984140.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.598984140.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.599210751.00000000058E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.599210751.00000000058E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.599210751.00000000058E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.599210751.00000000058E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000003.352344593.0000000001288000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.603445677.00000000075F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.603445677.00000000075F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.603445677.00000000075F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.603445677.00000000075F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.599845120.0000000005B40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.599845120.0000000005B40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.599845120.0000000005B40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.599845120.0000000005B40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.603926095.00000000079F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.603926095.00000000079F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.603926095.00000000079F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.603926095.00000000079F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.604219449.0000000007A20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.604219449.0000000007A20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.604219449.0000000007A20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.604219449.0000000007A20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.578455701.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.603631836.0000000007620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.603631836.0000000007620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.603631836.0000000007620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.603631836.0000000007620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000C.00000002.433432436.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000C.00000002.433432436.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.587607897.0000000004B4C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.604565341.0000000007A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.604565341.0000000007A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.604565341.0000000007A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.604565341.0000000007A60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000A.00000002.434966346.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000C.00000002.435644286.0000000003A84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: kcnXZ6yXoo.exe PID: 5256, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: kcnXZ6yXoo.exe PID: 5256, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: kcnXZ6yXoo.exe PID: 5256, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: kcnXZ6yXoo.exe PID: 3396, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: kcnXZ6yXoo.exe PID: 3396, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: dhcpmon.exe PID: 2284, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: dhcpmon.exe PID: 2284, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: dhcpmon.exe PID: 2284, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: kcnXZ6yXoo.exe PID: 2004, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: kcnXZ6yXoo.exe PID: 2004, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 0_2_028EC1C4
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 0_2_028EE601
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 0_2_028EE610
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 0_2_073E0040
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 0_2_073E0006
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 0_2_073E0040
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 2_2_0553E471
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 2_2_0553E480
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 2_2_0553BBD4
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 2_2_06A80040
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 2_2_06A88EC8
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 2_2_06A87C08
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 2_2_06A88820
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 2_2_06A88F86
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 7_2_0161C1C4
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 7_2_0161E602
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 7_2_0161E610
    Source: kcnXZ6yXoo.exe, 00000000.00000000.305925550.00000000007D6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamepcpv.exe@ vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000000.00000002.358432471.0000000007250000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000000.00000002.332268790.0000000003BCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.604219449.0000000007A48000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004131000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.604138192.0000000007A18000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.603581661.0000000007610000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.603254412.0000000007490000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.603323053.00000000074A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.604565341.0000000007A6E000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004C3A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004C3A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004C3A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004C3A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004C3A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004C3A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004C3A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.00000000030B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.602903443.0000000007450000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.603445677.00000000075F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000003.352344593.0000000001288000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.603926095.00000000079F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.604219449.0000000007A20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.604219449.0000000007A20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.603631836.0000000007620000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B4C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B4C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000007.00000002.389046094.0000000004489000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 00000007.00000002.389046094.000000000441B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 0000000C.00000002.433432436.0000000002A11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exe, 0000000C.00000002.433432436.0000000002A11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exeBinary or memory string: OriginalFilenamepcpv.exe@ vs kcnXZ6yXoo.exe
    Source: kcnXZ6yXoo.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: dhcpmon.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: kcnXZ6yXoo.exeReversingLabs: Detection: 25%
    Source: kcnXZ6yXoo.exeVirustotal: Detection: 32%
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeFile read: C:\Users\user\Desktop\kcnXZ6yXoo.exeJump to behavior
    Source: kcnXZ6yXoo.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: unknownProcess created: C:\Users\user\Desktop\kcnXZ6yXoo.exe C:\Users\user\Desktop\kcnXZ6yXoo.exe
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Users\user\Desktop\kcnXZ6yXoo.exe C:\Users\user\Desktop\kcnXZ6yXoo.exe
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Users\user\Desktop\kcnXZ6yXoo.exe C:\Users\user\Desktop\kcnXZ6yXoo.exe
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp908E.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp9283.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Users\user\Desktop\kcnXZ6yXoo.exe C:\Users\user\Desktop\kcnXZ6yXoo.exe 0
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Users\user\Desktop\kcnXZ6yXoo.exe C:\Users\user\Desktop\kcnXZ6yXoo.exe
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Users\user\Desktop\kcnXZ6yXoo.exe C:\Users\user\Desktop\kcnXZ6yXoo.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
    Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Users\user\Desktop\kcnXZ6yXoo.exe C:\Users\user\Desktop\kcnXZ6yXoo.exe
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Users\user\Desktop\kcnXZ6yXoo.exe C:\Users\user\Desktop\kcnXZ6yXoo.exe
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp908E.tmp
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp9283.tmp
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Users\user\Desktop\kcnXZ6yXoo.exe C:\Users\user\Desktop\kcnXZ6yXoo.exe
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Users\user\Desktop\kcnXZ6yXoo.exe C:\Users\user\Desktop\kcnXZ6yXoo.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\kcnXZ6yXoo.exe.logJump to behavior
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeFile created: C:\Users\user\AppData\Local\Temp\tmp908E.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.evad.winEXE@24/12@14/1
    Source: kcnXZ6yXoo.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:3300:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1252:120:WilError_01
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{be28fce4-4930-4ffe-96ed-0110cf99b889}
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5768:120:WilError_01
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
    Source: 10.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 10.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 10.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
    Source: kcnXZ6yXoo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: kcnXZ6yXoo.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.603445677.00000000075F0000.00000004.08000000.00040000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.603581661.0000000007610000.00000004.08000000.00040000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.603254412.0000000007490000.00000004.08000000.00040000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004C3A000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.603323053.00000000074A0000.00000004.08000000.00040000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.603631836.0000000007620000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: kcnXZ6yXoo.exe, 00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp

    Data Obfuscation

    barindex
    Source: 10.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 10.2.dhcpmon.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 2_2_06A8D65A push es; retf
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 2_2_06A8C400 push es; retf
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeCode function: 7_2_0561D1E1 push 180563A8h; iretd
    Source: initial sampleStatic PE information: section name: .text entropy: 7.684974410396953
    Source: initial sampleStatic PE information: section name: .text entropy: 7.684974410396953
    Source: 10.2.dhcpmon.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 10.2.dhcpmon.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp908E.tmp

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeFile opened: C:\Users\user\Desktop\kcnXZ6yXoo.exe:Zone.Identifier read attributes | delete
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: Yara matchFile source: 0.2.kcnXZ6yXoo.exe.2b95c40.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.2.dhcpmon.exe.2ec5c74.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000008.00000002.376686559.0000000002EB0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.328392181.0000000002B80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: kcnXZ6yXoo.exe PID: 5256, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5920, type: MEMORYSTR
    Source: kcnXZ6yXoo.exe, 00000000.00000002.328392181.0000000002B80000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000007.00000002.378631520.0000000003212000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000008.00000002.376686559.0000000002EB0000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000009.00000002.419128246.00000000025B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
    Source: kcnXZ6yXoo.exe, 00000000.00000002.328392181.0000000002B80000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000007.00000002.378631520.0000000003212000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000008.00000002.376686559.0000000002EB0000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000009.00000002.419128246.00000000025B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exe TID: 2908Thread sleep time: -37665s >= -30000s
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exe TID: 1168Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exe TID: 1244Thread sleep time: -7378697629483816s >= -30000s
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exe TID: 4684Thread sleep time: -37665s >= -30000s
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exe TID: 3096Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5888Thread sleep time: -37665s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6036Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5896Thread sleep time: -37665s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 712Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1960Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exe TID: 4392Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3388Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWindow / User API: threadDelayed 9513
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWindow / User API: foregroundWindowGot 637
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWindow / User API: foregroundWindowGot 555
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess information queried: ProcessInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeThread delayed: delay time: 37665
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeThread delayed: delay time: 37665
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 37665
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 37665
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: dhcpmon.exe, 00000009.00000002.419128246.00000000025B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
    Source: dhcpmon.exe, 00000009.00000002.419128246.00000000025B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
    Source: kcnXZ6yXoo.exe, 00000002.00000002.570651317.000000000124A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllF
    Source: dhcpmon.exe, 00000009.00000002.419128246.00000000025B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
    Source: dhcpmon.exe, 00000009.00000002.419128246.00000000025B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeMemory allocated: page read and write | page guard

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeMemory written: C:\Users\user\Desktop\kcnXZ6yXoo.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeMemory written: C:\Users\user\Desktop\kcnXZ6yXoo.exe base: 400000 value starts with: 4D5A
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Users\user\Desktop\kcnXZ6yXoo.exe C:\Users\user\Desktop\kcnXZ6yXoo.exe
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Users\user\Desktop\kcnXZ6yXoo.exe C:\Users\user\Desktop\kcnXZ6yXoo.exe
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp908E.tmp
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp9283.tmp
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Users\user\Desktop\kcnXZ6yXoo.exe C:\Users\user\Desktop\kcnXZ6yXoo.exe
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeProcess created: C:\Users\user\Desktop\kcnXZ6yXoo.exe C:\Users\user\Desktop\kcnXZ6yXoo.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000360F000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.604987858.00000000082BB000.00000004.00000010.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.578455701.0000000003658000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: kcnXZ6yXoo.exe, 00000002.00000002.600463524.000000000683C000.00000004.00000010.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.603811706.00000000078AC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.00000000034C3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerP
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.0000000003214000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.578455701.00000000034FA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager8
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.00000000036E6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager4
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managert
    Source: kcnXZ6yXoo.exe, 00000002.00000002.603407697.00000000075EC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager h
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.00000000036E6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerDVZS
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Users\user\Desktop\kcnXZ6yXoo.exe VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Users\user\Desktop\kcnXZ6yXoo.exe VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Users\user\Desktop\kcnXZ6yXoo.exe VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Users\user\Desktop\kcnXZ6yXoo.exe VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\kcnXZ6yXoo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.58e0000.23.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4b6a44a.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.58e0000.23.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4a867ef.14.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4a92c1c.17.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.58e4629.24.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.kcnXZ6yXoo.exe.3a795d0.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4a9ba4d.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4b738a9.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4cd4449.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000000.00000002.332268790.0000000003E69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.411231497.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.432812642.0000000002AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.599210751.00000000058E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.433432436.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.435644286.0000000003A84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: kcnXZ6yXoo.exe PID: 5256, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: kcnXZ6yXoo.exe PID: 3396, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2284, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: kcnXZ6yXoo.exe PID: 2004, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: kcnXZ6yXoo.exe, 00000000.00000002.332268790.0000000003E69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: kcnXZ6yXoo.exe, 00000002.00000002.603581661.0000000007610000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000002.603581661.0000000007610000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: kcnXZ6yXoo.exe, 00000002.00000002.603254412.0000000007490000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000002.603254412.0000000007490000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: kcnXZ6yXoo.exe, 00000002.00000002.603323053.00000000074A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000002.603323053.00000000074A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004C3A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004C3A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: kcnXZ6yXoo.exe, 00000002.00000002.604138192.0000000007A10000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.00000000030B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.00000000030B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: kcnXZ6yXoo.exe, 00000002.00000002.602903443.0000000007450000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: kcnXZ6yXoo.exe, 00000002.00000002.603445677.00000000075F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000003.352344593.0000000001288000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000002.603926095.00000000079F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000002.604219449.0000000007A20000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: kcnXZ6yXoo.exe, 00000002.00000002.603631836.0000000007620000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000002.604565341.0000000007A60000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 0000000A.00000002.411231497.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 0000000A.00000002.432812642.0000000002AE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 0000000A.00000002.432812642.0000000002AE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: dhcpmon.exe, 0000000A.00000002.434966346.0000000003B2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 0000000A.00000002.434966346.0000000003B2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: kcnXZ6yXoo.exe, 0000000C.00000002.435644286.0000000003A6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 0000000C.00000002.435644286.0000000003A6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: HApplicationBaseMicrosoft.VisualBasic.ApplicationServicesUserConversionsMicrosoft.VisualBasic.CompilerServicesObjectFlowControlOperatorsProjectDataStandardModuleAttributeComputerMicrosoft.VisualBasic.DevicesHideModuleNameAttributeMyGroupCollectionAttributeContextValue`1Microsoft.VisualBasic.MyServices.InternalClientInvokeDelegateNanoCoreIClientDataNanoCore.ClientPluginIClientNetworkIClientDataHostNanoCore.ClientPluginHostIClientLoggingHostIClientNetworkHostIClientUIHostIClientNameObjectCollectionIClientReadOnlyNameObjectCollectionActivatorAppDomainArgumentOutOfRangeExceptionArrayAsyncCallbackBitConverterBooleanBufferByteCharCLSCompliantAttributeGeneratedCodeAttributeSystem.CodeDom.CompilerDictionary`2System.Collections.GenericEnumeratorIEnumerable`1KeyValuePair`2List`1IEnumeratorSystem.CollectionsEditorBrowsableAttributeSystem.ComponentModelEditorBrowsableStateApplicationSettingsBaseSystem.ConfigurationSettingsBaseDateTimeDateTimeKindDelegateDebuggerDisplay
    Source: kcnXZ6yXoo.exe, 0000000C.00000002.433432436.0000000002A11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: kcnXZ6yXoo.exe, 0000000C.00000002.433432436.0000000002A11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: kcnXZ6yXoo.exe, 0000000C.00000002.435644286.0000000003A84000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.58e0000.23.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4b6a44a.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4b6f280.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.58e0000.23.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4a867ef.14.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4a92c1c.17.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.kcnXZ6yXoo.exe.3e696a8.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.58e4629.24.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.kcnXZ6yXoo.exe.3a795d0.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.kcnXZ6yXoo.exe.3e9c2c8.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4a9ba4d.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4b738a9.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4cd4449.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.kcnXZ6yXoo.exe.4ccfe20.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000000.00000002.332268790.0000000003E69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.411231497.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.432812642.0000000002AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.599210751.00000000058E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.433432436.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.435644286.0000000003A84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: kcnXZ6yXoo.exe PID: 5256, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: kcnXZ6yXoo.exe PID: 3396, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2284, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: kcnXZ6yXoo.exe PID: 2004, type: MEMORYSTR
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Windows Management Instrumentation
    1
    Scheduled Task/Job
    112
    Process Injection
    2
    Masquerading
    11
    Input Capture
    211
    Security Software Discovery
    Remote Services11
    Input Capture
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default Accounts1
    Scheduled Task/Job
    Boot or Logon Initialization Scripts1
    Scheduled Task/Job
    1
    Disable or Modify Tools
    LSASS Memory2
    Process Discovery
    Remote Desktop Protocol11
    Archive Collected Data
    Exfiltration Over Bluetooth1
    Non-Standard Port
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
    Virtualization/Sandbox Evasion
    Security Account Manager21
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
    Remote Access Software
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
    Process Injection
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer1
    Non-Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Deobfuscate/Decode Files or Information
    LSA Secrets12
    System Information Discovery
    SSHKeyloggingData Transfer Size Limits21
    Application Layer Protocol
    Manipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    Hidden Files and Directories
    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup Items3
    Obfuscated Files or Information
    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job13
    Software Packing
    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 796220 Sample: kcnXZ6yXoo.exe Startdate: 01/02/2023 Architecture: WINDOWS Score: 100 57 Snort IDS alert for network traffic 2->57 59 Multi AV Scanner detection for domain / URL 2->59 61 Malicious sample detected (through community Yara rule) 2->61 63 14 other signatures 2->63 8 kcnXZ6yXoo.exe 3 2->8         started        12 kcnXZ6yXoo.exe 2 2->12         started        14 dhcpmon.exe 3 2->14         started        16 dhcpmon.exe 2 2->16         started        process3 file4 53 C:\Users\user\AppData\...\kcnXZ6yXoo.exe.log, ASCII 8->53 dropped 67 Uses schtasks.exe or at.exe to add and modify task schedules 8->67 69 Injects a PE file into a foreign processes 8->69 18 kcnXZ6yXoo.exe 1 15 8->18         started        23 kcnXZ6yXoo.exe 8->23         started        25 kcnXZ6yXoo.exe 12->25         started        27 kcnXZ6yXoo.exe 12->27         started        29 dhcpmon.exe 2 14->29         started        31 dhcpmon.exe 16->31         started        signatures5 process6 dnsIp7 55 tzitziklishop.ddns.net 45.12.253.26, 1665, 49701, 49702 CMCSUS Germany 18->55 45 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->45 dropped 47 C:\Users\user\AppData\Roaming\...\run.dat, data 18->47 dropped 49 C:\Users\user\AppData\Local\...\tmp908E.tmp, XML 18->49 dropped 51 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 18->51 dropped 65 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->65 33 schtasks.exe 1 18->33         started        35 schtasks.exe 1 18->35         started        37 MpCmdRun.exe 18->37         started        file8 signatures9 process10 process11 39 conhost.exe 33->39         started        41 conhost.exe 35->41         started        43 conhost.exe 37->43         started       

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    kcnXZ6yXoo.exe26%ReversingLabsWin32.Trojan.Pwsx
    kcnXZ6yXoo.exe32%VirustotalBrowse
    kcnXZ6yXoo.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe26%ReversingLabsWin32.Trojan.Pwsx
    SourceDetectionScannerLabelLinkDownload
    2.2.kcnXZ6yXoo.exe.58e0000.23.unpack100%AviraTR/NanoCore.fadteDownload File
    10.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    SourceDetectionScannerLabelLink
    tzitziklishop.ddns.net12%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.sakkal.comrm0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/~0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://www.fontbureau.com%0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/30%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/.0%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/%0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/X0%URL Reputationsafe
    http://www.founder.com.cn/cnhtRE_0%Avira URL Cloudsafe
    http://www.fontbureau.comsiva0%URL Reputationsafe
    http://www.galapagosdesign.com/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/X0%URL Reputationsafe
    http://www.fontbureau.comF0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/A0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
    http://www.fontbureau.comd0%URL Reputationsafe
    http://www.founder.com.cn/cntu0%URL Reputationsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.founder.com.cn/cn/0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/t0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
    http://www.fontbureau.comt0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.fontbureau.comals/0%URL Reputationsafe
    http://www.fontbureau.comcom.0%Avira URL Cloudsafe
    tzitziklishop.ddns.net100%Avira URL Cloudmalware
    http://www.fontbureau.comdiaF0%Avira URL Cloudsafe
    http://www.fontbureau.comFX0%Avira URL Cloudsafe
    http://www.fontbureau.comTTF/0%Avira URL Cloudsafe
    http://www.fontbureau.comlvfetf0%Avira URL Cloudsafe
    http://www.sakkal.comn0%Avira URL Cloudsafe
    http://www.fontbureau.comtoedA0%Avira URL Cloudsafe
    127.0.0.10%Avira URL Cloudsafe
    http://www.fontbureau.comtuo0%Avira URL Cloudsafe
    http://www.agfamonotype.Z0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    tzitziklishop.ddns.net
    45.12.253.26
    truetrueunknown
    NameMaliciousAntivirus DetectionReputation
    tzitziklishop.ddns.nettrue
    • Avira URL Cloud: malware
    unknown
    127.0.0.1true
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.fontbureau.comFXkcnXZ6yXoo.exe, 00000000.00000003.317844075.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317767247.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317955353.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://www.fontbureau.com/designersGkcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.fontbureau.com/designers/?kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.founder.com.cn/cn/bThekcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.sakkal.comrmkcnXZ6yXoo.exe, 00000000.00000003.315644708.00000000059F3000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.fontbureau.com/designers?kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.founder.com.cn/cnhtRE_kcnXZ6yXoo.exe, 00000000.00000003.311803735.00000000059E2000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.fontbureau.comdiaFkcnXZ6yXoo.exe, 00000000.00000003.318667992.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.fontbureau.comcom.kcnXZ6yXoo.exe, 00000000.00000003.318831764.00000000059FA000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.tiro.comkcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com/designerskcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.comTTF/kcnXZ6yXoo.exe, 00000000.00000003.317099709.0000000005A02000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.goodfont.co.krkcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://google.comkcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000002.00000002.603631836.0000000007620000.00000004.08000000.00040000.00000000.sdmpfalse
              high
              http://www.jiyu-kobo.co.jp/~kcnXZ6yXoo.exe, 00000000.00000003.314102705.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314576431.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314305088.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.comlvfetfkcnXZ6yXoo.exe, 00000000.00000003.326231202.00000000059FF000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.sajatypeworks.comkcnXZ6yXoo.exe, 00000000.00000003.308981659.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.sakkal.comnkcnXZ6yXoo.exe, 00000000.00000003.316285042.00000000059F6000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316444935.00000000059EF000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316031658.00000000059F6000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315690017.00000000059F4000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316410028.00000000059EE000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316514139.00000000059EF000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315917112.00000000059F6000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315726257.00000000059F4000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315865361.00000000059F4000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316321496.00000000059F6000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316162313.00000000059F6000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316214959.00000000059F6000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316551502.00000000059F4000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315832173.00000000059F4000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316368311.00000000059EE000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316124895.00000000059F6000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315960320.00000000059F4000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316082284.00000000059F6000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.typography.netDkcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cn/cThekcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.galapagosdesign.com/staff/dennis.htmkcnXZ6yXoo.exe, 00000000.00000003.319321867.0000000005A00000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.319384991.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://fontfabrik.comkcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com%kcnXZ6yXoo.exe, 00000000.00000003.318349413.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318831764.00000000059FA000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318667992.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318511932.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318481734.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318435369.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318276697.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318547414.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318320632.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318631646.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              low
              http://www.jiyu-kobo.co.jp/3kcnXZ6yXoo.exe, 00000000.00000003.315020936.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315364448.00000000059F8000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315507955.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315146785.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315428401.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314795179.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315644708.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315327758.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com.kcnXZ6yXoo.exe, 00000000.00000003.318349413.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318667992.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318511932.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318481734.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318435369.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318547414.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318631646.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://www.jiyu-kobo.co.jp/.kcnXZ6yXoo.exe, 00000000.00000003.315020936.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315364448.00000000059F8000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315865361.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315507955.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314576431.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315146785.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315690017.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315428401.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314795179.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315726257.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314305088.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315644708.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315327758.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315832173.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/kcnXZ6yXoo.exe, 00000000.00000003.317495074.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317720307.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317567364.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317368441.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317304521.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317844075.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317767247.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317955353.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317221145.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317147616.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317415466.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317268864.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://www.galapagosdesign.com/DPleasekcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.jiyu-kobo.co.jp/Y0kcnXZ6yXoo.exe, 00000000.00000003.315020936.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315364448.00000000059F8000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316162313.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315960320.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315865361.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315507955.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316031658.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314576431.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316082284.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315146785.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315690017.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315428401.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316124895.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315917112.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314795179.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315726257.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314305088.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315644708.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315327758.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315832173.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/frere-jones.html:kcnXZ6yXoo.exe, 00000000.00000003.317767247.00000000059F4000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317720307.00000000059F4000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317844075.00000000059F4000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317955353.00000000059F4000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://www.fonts.comkcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.jiyu-kobo.co.jp/%kcnXZ6yXoo.exe, 00000000.00000003.316321496.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315020936.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315364448.00000000059F8000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316162313.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315960320.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316285042.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314102705.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315865361.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315507955.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316031658.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314576431.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316082284.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315146785.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315690017.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315428401.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316124895.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315917112.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314795179.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315726257.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314305088.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315644708.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sandoll.co.krkcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.urwpp.deDPleasekcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.zhongyicts.com.cnkcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comtoedAkcnXZ6yXoo.exe, 00000000.00000003.318196897.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318137112.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318276697.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317844075.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317767247.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317955353.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namekcnXZ6yXoo.exe, 00000002.00000002.578455701.00000000030B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.sakkal.comkcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/jp/XkcnXZ6yXoo.exe, 00000000.00000003.315364448.00000000059F8000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315507955.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315428401.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315644708.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comsivakcnXZ6yXoo.exe, 00000000.00000003.318349413.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318831764.00000000059FA000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318667992.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318511932.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318481734.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318435369.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318547414.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318631646.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.apache.org/licenses/LICENSE-2.0kcnXZ6yXoo.exe, 00000000.00000003.312619033.00000000059F9000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comkcnXZ6yXoo.exe, 00000000.00000003.318667992.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318511932.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318481734.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.326231202.00000000059FF000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318435369.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318547414.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318631646.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.galapagosdesign.com/kcnXZ6yXoo.exe, 00000000.00000003.319447929.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.319321867.0000000005A00000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.319384991.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/XkcnXZ6yXoo.exe, 00000000.00000003.315020936.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314102705.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314576431.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315146785.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314795179.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314305088.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315327758.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comFkcnXZ6yXoo.exe, 00000000.00000003.318196897.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318349413.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318137112.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318831764.00000000059FA000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318667992.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318511932.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318481734.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317495074.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318930233.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317720307.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317567364.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317368441.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318435369.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317304521.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318276697.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318547414.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317844075.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317767247.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317955353.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318320632.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317221145.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.agfamonotype.ZkcnXZ6yXoo.exe, 00000000.00000003.326231202.00000000059E0000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.comtuokcnXZ6yXoo.exe, 00000000.00000003.317495074.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317720307.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317567364.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317368441.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317304521.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317844075.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317767247.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317955353.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317221145.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317147616.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317053909.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317099709.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317415466.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317268864.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.com/designers/cabarga.htmlP(kcnXZ6yXoo.exe, 00000000.00000003.318349413.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318481734.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318435369.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318276697.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318320632.0000000005A02000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.jiyu-kobo.co.jp/AkcnXZ6yXoo.exe, 00000000.00000003.315020936.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315364448.00000000059F8000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314102705.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315865361.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315507955.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314576431.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315146785.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315690017.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315428401.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314795179.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315726257.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314305088.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315644708.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315327758.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315832173.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/jp/kcnXZ6yXoo.exe, 00000000.00000003.315020936.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315364448.00000000059F8000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314102705.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315507955.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314576431.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315146785.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315428401.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314795179.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314305088.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315644708.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315327758.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comdkcnXZ6yXoo.exe, 00000000.00000003.317720307.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317844075.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317767247.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317955353.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cntukcnXZ6yXoo.exe, 00000000.00000003.311803735.00000000059E2000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.carterandcone.comlkcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cn/kcnXZ6yXoo.exe, 00000000.00000003.311803735.00000000059E2000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/cabarga.htmlNkcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.founder.com.cn/cnkcnXZ6yXoo.exe, 00000000.00000003.311803735.00000000059E2000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/frere-jones.htmlkcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.jiyu-kobo.co.jp/tkcnXZ6yXoo.exe, 00000000.00000003.315364448.00000000059F8000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315865361.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315507955.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315690017.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315428401.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315726257.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315644708.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315832173.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/Y0/kcnXZ6yXoo.exe, 00000000.00000003.315020936.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315364448.00000000059F8000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316162313.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315960320.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315865361.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315507955.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316031658.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316082284.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315146785.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315690017.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315428401.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316124895.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315917112.0000000005A04000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.314795179.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315726257.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315644708.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.316214959.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315327758.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.315832173.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comtkcnXZ6yXoo.exe, 00000000.00000003.317495074.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317720307.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317567364.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317368441.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317304521.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317014695.0000000005A01000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317844075.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317767247.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317955353.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317221145.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317147616.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317053909.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317099709.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317415466.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.317268864.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/kcnXZ6yXoo.exe, 00000000.00000003.315832173.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers8kcnXZ6yXoo.exe, 00000000.00000002.354713070.0000000006BF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.comals/kcnXZ6yXoo.exe, 00000000.00000003.318481734.0000000005A03000.00000004.00000020.00020000.00000000.sdmp, kcnXZ6yXoo.exe, 00000000.00000003.318435369.0000000005A03000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    45.12.253.26
                                    tzitziklishop.ddns.netGermany
                                    33657CMCSUStrue
                                    Joe Sandbox Version:36.0.0 Rainbow Opal
                                    Analysis ID:796220
                                    Start date and time:2023-02-01 18:23:13 +01:00
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 13m 28s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:20
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample file name:kcnXZ6yXoo.exe
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@24/12@14/1
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HDC Information:Failed
                                    HCA Information:
                                    • Successful, ratio: 99%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): HxTsr.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe
                                    • TCP Packets have been reduced to 100
                                    • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, login.live.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                    TimeTypeDescription
                                    18:24:20API Interceptor841x Sleep call for process: kcnXZ6yXoo.exe modified
                                    18:24:26Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\kcnXZ6yXoo.exe" s>$(Arg0)
                                    18:24:28Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                                    18:24:29AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    18:24:36API Interceptor2x Sleep call for process: dhcpmon.exe modified
                                    18:25:03API Interceptor1x Sleep call for process: MpCmdRun.exe modified
                                    No context
                                    No context
                                    No context
                                    No context
                                    No context
                                    Process:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):801792
                                    Entropy (8bit):7.681976997147394
                                    Encrypted:false
                                    SSDEEP:24576:yLzyRU5BVftZtPOYkNc9/vgumFRXjVDaqG4yPa:SzyRU/VfbtGpU/vgum7Z7
                                    MD5:CFFCACECCD0C05762DC335F58A2F0932
                                    SHA1:45FBB9DDF062F8B64BA3B8ACE48767991517FA50
                                    SHA-256:BDFC24D604F256170914E2F360D8B6ED30182FE8682FC11AA136DEC7A5FB1876
                                    SHA-512:D36DE14335FD20C41420E3BFDF69481E3C011F99F4E586E2C91D0B2976F6CB88C9CC63E36F1638D9C647025DF580CAE947E28BB2AEE8206AF4990271941B0942
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 26%
                                    Reputation:unknown
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....h.c..............0..2...........P... ...`....@.. ....................................@.................................4P..O....`............................................................................... ............... ..H............text....0... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............:..............@..B................hP......H........W...K.............h.............................................{#...*..{$...*V.(%.....}#.....}$...*...0..C........u........6.,0(&....{#....{#...o'...,.((....{$....{$...o)...+..+..*. .... )UU.Z(&....{#...o*...X )UU.Z((....{$...o+...X*.0..b........r...p......%..{#......%q.........-.&.+.......o,....%..{$......%q.........-.&.+.......o,....(-...*&.(%.....*.0..9........~.........,".rG..p.....(....o/...s0...........~.....+..*....0...........~.....+..*".......*.0..........
                                    Process:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):26
                                    Entropy (8bit):3.95006375643621
                                    Encrypted:false
                                    SSDEEP:3:ggPYV:rPYV
                                    MD5:187F488E27DB4AF347237FE461A079AD
                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                    Malicious:true
                                    Reputation:unknown
                                    Preview:[ZoneTransfer]....ZoneId=0
                                    Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1216
                                    Entropy (8bit):5.355304211458859
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                    MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                    SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                    SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                    SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                    Process:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1216
                                    Entropy (8bit):5.355304211458859
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                    MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                    SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                    SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                    SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                    Malicious:true
                                    Reputation:unknown
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                    Process:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1301
                                    Entropy (8bit):5.106596988930126
                                    Encrypted:false
                                    SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0PLxtn:cbk4oL600QydbQxIYODOLedq3SLj
                                    MD5:742DC6DB0CE6E76E140A3D4E39B2BA1B
                                    SHA1:2475B398B66E72F89D6EDEFFAE763F6372D8302E
                                    SHA-256:54C25E2C914986FC96E3DDFADF625DC44347ACF73C482AB55DE77EF66A9F3548
                                    SHA-512:7E78EC9672F25D84F9CB02F07798EFBEADD108AFCA22B7062BFCCBCE7C99C5CB9A319B6BFC9643323850980F474A48907A25C70A1B757329443E333DA0FB3EB0
                                    Malicious:true
                                    Reputation:unknown
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                    Process:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1310
                                    Entropy (8bit):5.109425792877704
                                    Encrypted:false
                                    SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                    MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                    SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                    SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                    SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                    Process:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):232
                                    Entropy (8bit):7.024371743172393
                                    Encrypted:false
                                    SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                                    MD5:32D0AAE13696FF7F8AF33B2D22451028
                                    SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                                    SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                                    SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                                    Process:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):8
                                    Entropy (8bit):3.0
                                    Encrypted:false
                                    SSDEEP:3:3/hwn:Phw
                                    MD5:E822B6AED0FE7815560B1BC483AB3A36
                                    SHA1:02CB81F7E45179F377A33BA662D98912C8F2CE2A
                                    SHA-256:8A059E77296BE8B93CB4C9ADA71F0BF05F7F8522CE66DFBC7DB7550C55F72CDC
                                    SHA-512:D91B717CF31B0CA96EE66A7B212A4AE8B30FC361569163130C1867CF76E0C163BD979F88A2BDE7D5A71020DCBB60314F830927032C87BD75C71FFFAFBC2A9AAE
                                    Malicious:true
                                    Reputation:unknown
                                    Preview:DW.....H
                                    Process:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    File Type:data
                                    Category:modified
                                    Size (bytes):40
                                    Entropy (8bit):5.221928094887364
                                    Encrypted:false
                                    SSDEEP:3:9bzY6oRDMjmPl:RzWDMCd
                                    MD5:AE0F5E6CE7122AF264EC533C6B15A27B
                                    SHA1:1265A495C42EED76CC043D50C60C23297E76CCE1
                                    SHA-256:73B0B92179C61C26589B47E9732CE418B07EDEE3860EE5A2A5FB06F3B8AA9B26
                                    SHA-512:DD44C2D24D4E3A0F0B988AD3D04683B5CB128298043134649BBE33B2512CE0C9B1A8E7D893B9F66FBBCDD901E2B0646C4533FB6C0C8C4AFCB95A0EFB95D446F8
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:9iH...}Z.4..f..... 8.j....|.&X..e.F.*.
                                    Process:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):327432
                                    Entropy (8bit):7.99938831605763
                                    Encrypted:true
                                    SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                                    MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                                    SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                                    SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                                    SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                                    Process:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):38
                                    Entropy (8bit):4.247927513443587
                                    Encrypted:false
                                    SSDEEP:3:oNUWJRWOGxANn:oNNJAO+AN
                                    MD5:BA03B1FDA372E0CEC6CB8137CE0E9F9C
                                    SHA1:CB6CFCC683ADF187368236200DC03784AF823C2D
                                    SHA-256:974E48D90CA0A8106A1015DF406414CCF898FB1273048D9C3EFFB170E0EC2080
                                    SHA-512:0F001690BFB1F2F08AB387FC91E8915B9FEAD54F43042BF4552A739D9E089E62833E3F03792CD5ECD856D38695656884F1E69CC143973AE4C0B61D4145F3D2EC
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:modified
                                    Size (bytes):8156
                                    Entropy (8bit):3.1667968290132404
                                    Encrypted:false
                                    SSDEEP:96:cEj+AbCEH+AbuEAc+AbhGEA+AbNEe+Ab/Ee+AbPE6w9+Ab1wTEE+Ab5EA+Ab+:cY+38+DJc+iGr+MZ+65+6tg+ECf+Yb+7
                                    MD5:69D0BB0FF1440A999D2A62D4E1DDADA2
                                    SHA1:2C11F6559572A47FB12224B9B2250673B0798542
                                    SHA-256:A9BEE03B8BA91FC77806EBA39D968711523D9F4B38E56146E1C02F1730256B9A
                                    SHA-512:E5E4867165319D230C755953FC4D132513A709F6AE53BC085612C9861ED25D88FA15B331BA0F467A58D92B8ECA844E132D0594DE340BED0E2A5A9F68BD26399A
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....E.R.R.O.R.:. .M.p.W.D.E.n.a.b.l.e.(.T.R.U.E.). .f.a.i.l.e.d. .(.8.0.0.7.0.4.E.C.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.............-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.681976997147394
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    • DOS Executable Generic (2002/1) 0.01%
                                    File name:kcnXZ6yXoo.exe
                                    File size:801792
                                    MD5:cffcaceccd0c05762dc335f58a2f0932
                                    SHA1:45fbb9ddf062f8b64ba3b8ace48767991517fa50
                                    SHA256:bdfc24d604f256170914e2f360d8b6ed30182fe8682fc11aa136dec7a5fb1876
                                    SHA512:d36de14335fd20c41420e3bfdf69481e3c011f99f4e586e2c91d0b2976f6cb88c9cc63e36f1638d9c647025df580cae947e28bb2aee8206af4990271941b0942
                                    SSDEEP:24576:yLzyRU5BVftZtPOYkNc9/vgumFRXjVDaqG4yPa:SzyRU/VfbtGpU/vgum7Z7
                                    TLSH:48058C8777F1A872F6CB10A1142837CD2FE0B103BE55A2579B7B7AC0A7059FB7698241
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....h.c..............0..2...........P... ...`....@.. ....................................@................................
                                    Icon Hash:00828e8e8686b000
                                    Entrypoint:0x4c5086
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x63DA6893 [Wed Feb 1 13:26:43 2023 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc50340x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc60000x5c4.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xc80000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xc308c0xc3200False0.8482968649903908data7.684974410396953IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0xc60000x5c40x600False0.4303385416666667data4.121702670518778IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0xc80000xc0x200False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountry
                                    RT_VERSION0xc60900x334data
                                    RT_MANIFEST0xc63d40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                    192.168.2.545.12.253.264972516652816766 02/01/23-18:26:06.563289TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497251665192.168.2.545.12.253.26
                                    192.168.2.545.12.253.264971916652816766 02/01/23-18:25:38.356322TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497191665192.168.2.545.12.253.26
                                    192.168.2.545.12.253.264972216652816766 02/01/23-18:25:51.759928TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497221665192.168.2.545.12.253.26
                                    192.168.2.545.12.253.264971516652816766 02/01/23-18:25:18.162168TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497151665192.168.2.545.12.253.26
                                    192.168.2.545.12.253.264972616652816718 02/01/23-18:26:14.335036TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497261665192.168.2.545.12.253.26
                                    192.168.2.545.12.253.264970116652816766 02/01/23-18:24:35.085073TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497011665192.168.2.545.12.253.26
                                    192.168.2.545.12.253.264971616652816718 02/01/23-18:25:24.426541TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497161665192.168.2.545.12.253.26
                                    192.168.2.545.12.253.264970316652816766 02/01/23-18:24:53.542008TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497031665192.168.2.545.12.253.26
                                    192.168.2.545.12.253.264972116652816766 02/01/23-18:25:45.484001TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497211665192.168.2.545.12.253.26
                                    192.168.2.545.12.253.264972616652816766 02/01/23-18:26:14.335036TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497261665192.168.2.545.12.253.26
                                    45.12.253.26192.168.2.51665497042810290 02/01/23-18:25:00.449651TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 116654970445.12.253.26192.168.2.5
                                    192.168.2.545.12.253.264971316652816766 02/01/23-18:25:12.038226TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497131665192.168.2.545.12.253.26
                                    192.168.2.545.12.253.264971616652816766 02/01/23-18:25:24.426541TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497161665192.168.2.545.12.253.26
                                    192.168.2.545.12.253.264972316652816766 02/01/23-18:25:58.538683TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497231665192.168.2.545.12.253.26
                                    192.168.2.545.12.253.264971816652816766 02/01/23-18:25:32.163358TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497181665192.168.2.545.12.253.26
                                    192.168.2.545.12.253.264970416652816766 02/01/23-18:25:02.005236TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497041665192.168.2.545.12.253.26
                                    192.168.2.545.12.253.264970216652816766 02/01/23-18:24:42.851032TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497021665192.168.2.545.12.253.26
                                    TimestampSource PortDest PortSource IPDest IP
                                    Feb 1, 2023 18:24:32.956590891 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:32.983227015 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:32.983406067 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.251296043 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.344775915 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.369502068 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.397341013 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.480207920 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.553070068 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.618894100 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.618937969 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.618963957 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.618989944 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.619014978 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.619076967 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.645889997 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.645936966 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.645963907 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.645992041 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.646007061 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.646023035 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.646051884 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.646059036 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.646083117 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.646112919 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.646117926 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.646148920 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.673034906 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.673067093 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.673086882 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.673110962 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.673130989 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.673145056 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.673157930 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.673161983 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.673171997 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.673192978 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.673213959 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.673214912 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.673214912 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.673234940 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.673242092 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.673259020 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.673264027 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.673274040 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.673289061 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.673302889 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.673316956 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.673455954 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.703617096 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.703659058 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.703694105 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.703716040 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.703721046 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.703749895 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.703761101 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.703780890 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.703809023 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.703824043 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.703838110 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.703865051 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.703891039 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.703896046 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.703918934 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.703931093 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.703947067 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.703974009 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.704008102 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.704022884 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.704060078 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.704085112 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.704094887 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.704106092 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.704123020 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.704125881 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.704148054 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.704166889 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.704183102 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.704185009 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.704205990 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.704207897 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.704227924 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.704246998 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.704266071 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.704271078 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.704286098 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.704304934 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.704305887 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.704328060 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.704340935 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.704346895 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.704359055 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.704368114 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.704511881 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.705514908 CET497011665192.168.2.545.12.253.26
                                    Feb 1, 2023 18:24:33.731372118 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.731425047 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.731447935 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.731468916 CET16654970145.12.253.26192.168.2.5
                                    Feb 1, 2023 18:24:33.731492996 CET16654970145.12.253.26192.168.2.5
                                    TimestampSource PortDest PortSource IPDest IP
                                    Feb 1, 2023 18:24:32.921785116 CET6189353192.168.2.58.8.8.8
                                    Feb 1, 2023 18:24:32.938868046 CET53618938.8.8.8192.168.2.5
                                    Feb 1, 2023 18:24:42.153881073 CET6064953192.168.2.58.8.8.8
                                    Feb 1, 2023 18:24:42.174824953 CET53606498.8.8.8192.168.2.5
                                    Feb 1, 2023 18:24:51.149646997 CET5144153192.168.2.58.8.8.8
                                    Feb 1, 2023 18:24:51.167306900 CET53514418.8.8.8192.168.2.5
                                    Feb 1, 2023 18:24:59.879889011 CET4917753192.168.2.58.8.8.8
                                    Feb 1, 2023 18:24:59.899542093 CET53491778.8.8.8192.168.2.5
                                    Feb 1, 2023 18:25:08.673640966 CET5503953192.168.2.58.8.8.8
                                    Feb 1, 2023 18:25:08.691450119 CET53550398.8.8.8192.168.2.5
                                    Feb 1, 2023 18:25:17.143487930 CET5922053192.168.2.58.8.8.8
                                    Feb 1, 2023 18:25:17.161024094 CET53592208.8.8.8192.168.2.5
                                    Feb 1, 2023 18:25:23.423448086 CET5506853192.168.2.58.8.8.8
                                    Feb 1, 2023 18:25:23.442995071 CET53550688.8.8.8192.168.2.5
                                    Feb 1, 2023 18:25:30.328228951 CET5853253192.168.2.58.8.8.8
                                    Feb 1, 2023 18:25:30.348001003 CET53585328.8.8.8192.168.2.5
                                    Feb 1, 2023 18:25:37.211065054 CET6265953192.168.2.58.8.8.8
                                    Feb 1, 2023 18:25:37.230679035 CET53626598.8.8.8192.168.2.5
                                    Feb 1, 2023 18:25:43.744879007 CET5626353192.168.2.58.8.8.8
                                    Feb 1, 2023 18:25:43.764518976 CET53562638.8.8.8192.168.2.5
                                    Feb 1, 2023 18:25:50.862020969 CET6551353192.168.2.58.8.8.8
                                    Feb 1, 2023 18:25:50.881623983 CET53655138.8.8.8192.168.2.5
                                    Feb 1, 2023 18:25:56.912189007 CET5668753192.168.2.58.8.8.8
                                    Feb 1, 2023 18:25:56.931782007 CET53566878.8.8.8192.168.2.5
                                    Feb 1, 2023 18:26:04.864137888 CET5268853192.168.2.58.8.8.8
                                    Feb 1, 2023 18:26:04.883476973 CET53526888.8.8.8192.168.2.5
                                    Feb 1, 2023 18:26:13.092663050 CET6134453192.168.2.58.8.8.8
                                    Feb 1, 2023 18:26:13.110131979 CET53613448.8.8.8192.168.2.5
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Feb 1, 2023 18:24:32.921785116 CET192.168.2.58.8.8.80xe461Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:24:42.153881073 CET192.168.2.58.8.8.80x6984Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:24:51.149646997 CET192.168.2.58.8.8.80x4d61Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:24:59.879889011 CET192.168.2.58.8.8.80x7513Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:25:08.673640966 CET192.168.2.58.8.8.80x9501Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:25:17.143487930 CET192.168.2.58.8.8.80x62e6Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:25:23.423448086 CET192.168.2.58.8.8.80x6297Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:25:30.328228951 CET192.168.2.58.8.8.80x6e34Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:25:37.211065054 CET192.168.2.58.8.8.80x607fStandard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:25:43.744879007 CET192.168.2.58.8.8.80x4c0dStandard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:25:50.862020969 CET192.168.2.58.8.8.80x9faeStandard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:25:56.912189007 CET192.168.2.58.8.8.80xe12bStandard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:26:04.864137888 CET192.168.2.58.8.8.80xf4e6Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:26:13.092663050 CET192.168.2.58.8.8.80x8bd2Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Feb 1, 2023 18:24:32.938868046 CET8.8.8.8192.168.2.50xe461No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:24:42.174824953 CET8.8.8.8192.168.2.50x6984No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:24:51.167306900 CET8.8.8.8192.168.2.50x4d61No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:24:59.899542093 CET8.8.8.8192.168.2.50x7513No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:25:08.691450119 CET8.8.8.8192.168.2.50x9501No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:25:17.161024094 CET8.8.8.8192.168.2.50x62e6No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:25:23.442995071 CET8.8.8.8192.168.2.50x6297No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:25:30.348001003 CET8.8.8.8192.168.2.50x6e34No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:25:37.230679035 CET8.8.8.8192.168.2.50x607fNo error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:25:43.764518976 CET8.8.8.8192.168.2.50x4c0dNo error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:25:50.881623983 CET8.8.8.8192.168.2.50x9faeNo error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:25:56.931782007 CET8.8.8.8192.168.2.50xe12bNo error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:26:04.883476973 CET8.8.8.8192.168.2.50xf4e6No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                    Feb 1, 2023 18:26:13.110131979 CET8.8.8.8192.168.2.50x8bd2No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false

                                    Click to jump to process

                                    Target ID:0
                                    Start time:18:24:12
                                    Start date:01/02/2023
                                    Path:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    Imagebase:0x710000
                                    File size:801792 bytes
                                    MD5 hash:CFFCACECCD0C05762DC335F58A2F0932
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.332268790.0000000003E69000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.332268790.0000000003E69000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.332268790.0000000003E69000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.332268790.0000000003E69000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.328392181.0000000002B80000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low

                                    Target ID:1
                                    Start time:18:24:21
                                    Start date:01/02/2023
                                    Path:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    Imagebase:0x20000
                                    File size:801792 bytes
                                    MD5 hash:CFFCACECCD0C05762DC335F58A2F0932
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low

                                    Target ID:2
                                    Start time:18:24:21
                                    Start date:01/02/2023
                                    Path:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    Imagebase:0xcc0000
                                    File size:801792 bytes
                                    MD5 hash:CFFCACECCD0C05762DC335F58A2F0932
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.603514529.0000000007600000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.587607897.0000000004999000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.603581661.0000000007610000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.603581661.0000000007610000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.603581661.0000000007610000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.603581661.0000000007610000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.587607897.0000000004CCB000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.587607897.0000000004BDF000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.603254412.0000000007490000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.603254412.0000000007490000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.603254412.0000000007490000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.603254412.0000000007490000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.603323053.00000000074A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.603323053.00000000074A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.603323053.00000000074A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.603323053.00000000074A0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.587607897.0000000004A86000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.604138192.0000000007A10000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.604138192.0000000007A10000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.604138192.0000000007A10000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.604138192.0000000007A10000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.602903443.0000000007450000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.602903443.0000000007450000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.602903443.0000000007450000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.602903443.0000000007450000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.587607897.0000000004C3A000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.587607897.0000000004C3A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.598984140.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.598984140.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.598984140.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.598984140.00000000057E0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.599210751.00000000058E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.599210751.00000000058E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.599210751.00000000058E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.599210751.00000000058E0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.599210751.00000000058E0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000003.352344593.0000000001288000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.603445677.00000000075F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.603445677.00000000075F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.603445677.00000000075F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.603445677.00000000075F0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.599845120.0000000005B40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.599845120.0000000005B40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.599845120.0000000005B40000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.599845120.0000000005B40000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.603926095.00000000079F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.603926095.00000000079F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.603926095.00000000079F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.603926095.00000000079F0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.604219449.0000000007A20000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.604219449.0000000007A20000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.604219449.0000000007A20000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.604219449.0000000007A20000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.587607897.0000000004B6A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.578455701.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.603631836.0000000007620000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.603631836.0000000007620000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.603631836.0000000007620000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.603631836.0000000007620000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.587607897.0000000004B4C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.604565341.0000000007A60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.604565341.0000000007A60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.604565341.0000000007A60000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.604565341.0000000007A60000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.578455701.000000000311D000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    Reputation:low

                                    Target ID:3
                                    Start time:18:24:25
                                    Start date:01/02/2023
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp908E.tmp
                                    Imagebase:0xcd0000
                                    File size:185856 bytes
                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:4
                                    Start time:18:24:25
                                    Start date:01/02/2023
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7fcd70000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:5
                                    Start time:18:24:25
                                    Start date:01/02/2023
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp9283.tmp
                                    Imagebase:0xcd0000
                                    File size:185856 bytes
                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:6
                                    Start time:18:24:26
                                    Start date:01/02/2023
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7fcd70000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:7
                                    Start time:18:24:27
                                    Start date:01/02/2023
                                    Path:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\kcnXZ6yXoo.exe 0
                                    Imagebase:0xce0000
                                    File size:801792 bytes
                                    MD5 hash:CFFCACECCD0C05762DC335F58A2F0932
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:low

                                    Target ID:8
                                    Start time:18:24:29
                                    Start date:01/02/2023
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                                    Imagebase:0x990000
                                    File size:801792 bytes
                                    MD5 hash:CFFCACECCD0C05762DC335F58A2F0932
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000008.00000002.376686559.0000000002EB0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Antivirus matches:
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 26%, ReversingLabs
                                    Reputation:low

                                    Target ID:9
                                    Start time:18:24:40
                                    Start date:01/02/2023
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                    Imagebase:0x20000
                                    File size:801792 bytes
                                    MD5 hash:CFFCACECCD0C05762DC335F58A2F0932
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:low

                                    Target ID:10
                                    Start time:18:24:42
                                    Start date:01/02/2023
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Imagebase:0x730000
                                    File size:801792 bytes
                                    MD5 hash:CFFCACECCD0C05762DC335F58A2F0932
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.411231497.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.411231497.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 0000000A.00000002.411231497.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.411231497.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.432812642.0000000002AE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 0000000A.00000002.432812642.0000000002AE1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.432812642.0000000002AE1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.434966346.0000000003B2A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    Reputation:low

                                    Target ID:11
                                    Start time:18:24:43
                                    Start date:01/02/2023
                                    Path:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    Imagebase:0x2d0000
                                    File size:801792 bytes
                                    MD5 hash:CFFCACECCD0C05762DC335F58A2F0932
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low

                                    Target ID:12
                                    Start time:18:24:43
                                    Start date:01/02/2023
                                    Path:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\kcnXZ6yXoo.exe
                                    Imagebase:0x5b0000
                                    File size:801792 bytes
                                    MD5 hash:CFFCACECCD0C05762DC335F58A2F0932
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000C.00000002.435644286.0000000003A6F000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.433432436.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.433432436.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000C.00000002.433432436.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.435644286.0000000003A84000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000C.00000002.435644286.0000000003A84000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    Reputation:low

                                    Target ID:13
                                    Start time:18:24:59
                                    Start date:01/02/2023
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Imagebase:0xb10000
                                    File size:801792 bytes
                                    MD5 hash:CFFCACECCD0C05762DC335F58A2F0932
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:low

                                    Target ID:16
                                    Start time:18:25:02
                                    Start date:01/02/2023
                                    Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                    Imagebase:0x7ff71e280000
                                    File size:455656 bytes
                                    MD5 hash:A267555174BFA53844371226F482B86B
                                    Has elevated privileges:true
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:17
                                    Start time:18:25:02
                                    Start date:01/02/2023
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7fcd70000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language

                                    No disassembly