Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3yIxxU5Wko.exe

Overview

General Information

Sample Name:3yIxxU5Wko.exe
Analysis ID:796775
MD5:6df2c2caaccc7947f8439f248cdd386f
SHA1:419ab96d1452301f126f63ab7e3135c9201e3f61
SHA256:8ecc4898d03bf034a6586ff886d9883b2ac27d08bdfe70dbd9878a4d77d5dce8
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • 3yIxxU5Wko.exe (PID: 5192 cmdline: C:\Users\user\Desktop\3yIxxU5Wko.exe MD5: 6DF2C2CAACCC7947F8439F248CDD386F)
    • 3yIxxU5Wko.exe (PID: 3232 cmdline: C:\Users\user\Desktop\3yIxxU5Wko.exe MD5: 6DF2C2CAACCC7947F8439F248CDD386F)
    • 3yIxxU5Wko.exe (PID: 5480 cmdline: C:\Users\user\Desktop\3yIxxU5Wko.exe MD5: 6DF2C2CAACCC7947F8439F248CDD386F)
      • schtasks.exe (PID: 320 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpFB74.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 3108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5348 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpFD98.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 3732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • conhost.exe (PID: 5348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • 3yIxxU5Wko.exe (PID: 4748 cmdline: C:\Users\user\Desktop\3yIxxU5Wko.exe 0 MD5: 6DF2C2CAACCC7947F8439F248CDD386F)
    • 3yIxxU5Wko.exe (PID: 5868 cmdline: C:\Users\user\Desktop\3yIxxU5Wko.exe MD5: 6DF2C2CAACCC7947F8439F248CDD386F)
    • 3yIxxU5Wko.exe (PID: 2376 cmdline: C:\Users\user\Desktop\3yIxxU5Wko.exe MD5: 6DF2C2CAACCC7947F8439F248CDD386F)
  • dhcpmon.exe (PID: 4976 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: 6DF2C2CAACCC7947F8439F248CDD386F)
    • dhcpmon.exe (PID: 1748 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 6DF2C2CAACCC7947F8439F248CDD386F)
    • dhcpmon.exe (PID: 4500 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 6DF2C2CAACCC7947F8439F248CDD386F)
  • dhcpmon.exe (PID: 3424 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: 6DF2C2CAACCC7947F8439F248CDD386F)
    • dhcpmon.exe (PID: 5884 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 6DF2C2CAACCC7947F8439F248CDD386F)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "be28fce4-4930-4ffe-96ed-0110cf99", "Group": "SecureKMT", "Domain1": "tzitziklishop.ddns.net", "Domain2": "127.0.0.1", "Port": 1665, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0x59eb:$x1: NanoCore.ClientPluginHost
  • 0x5b48:$x2: IClientNetworkHost
00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
  • 0x59eb:$x2: NanoCore.ClientPluginHost
  • 0x6941:$s3: PipeExists
  • 0x5be1:$s4: PipeCreated
  • 0x5a05:$s5: IClientLoggingHost
00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x5ad5:$x2: NanoCore.ClientPlugin
  • 0x59eb:$x3: NanoCore.ClientPluginHost
  • 0x5aeb:$i3: IClientNetwork
  • 0x5a24:$i5: IClientDataHost
  • 0x5a05:$i6: IClientLoggingHost
  • 0x5b48:$i7: IClientNetworkHost
  • 0x5a43:$i8: IClientUIHost
  • 0x6955:$i9: IClientNameObjectCollection
  • 0x54fc:$s1: ClientPlugin
  • 0x5ade:$s1: ClientPlugin
  • 0x6971:$s6: get_ClientSettings
00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x59eb:$a1: NanoCore.ClientPluginHost
  • 0x5ad5:$a2: NanoCore.ClientPlugin
  • 0x732e:$b7: LogClientException
  • 0x6941:$b8: PipeExists
  • 0x5a05:$b9: IClientLoggingHost
00000002.00000002.532206387.00000000055F0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0xe75:$x1: NanoCore.ClientPluginHost
  • 0xe8f:$x2: IClientNetworkHost
Click to see the 102 entries
SourceRuleDescriptionAuthorStrings
2.2.3yIxxU5Wko.exe.73f0000.25.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0x605:$x1: NanoCore.ClientPluginHost
  • 0x63e:$x2: IClientNetworkHost
2.2.3yIxxU5Wko.exe.73f0000.25.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
  • 0x605:$x2: NanoCore.ClientPluginHost
  • 0x720:$s4: PipeCreated
  • 0x61f:$s5: IClientLoggingHost
2.2.3yIxxU5Wko.exe.73f0000.25.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x67f:$x2: NanoCore.ClientPlugin
  • 0x605:$x3: NanoCore.ClientPluginHost
  • 0x695:$i3: IClientNetwork
  • 0x61f:$i6: IClientLoggingHost
  • 0x63e:$i7: IClientNetworkHost
  • 0x688:$s1: ClientPlugin
2.2.3yIxxU5Wko.exe.73f0000.25.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x605:$a1: NanoCore.ClientPluginHost
  • 0x67f:$a2: NanoCore.ClientPlugin
  • 0xda0:$b7: LogClientException
  • 0x61f:$b9: IClientLoggingHost
2.2.3yIxxU5Wko.exe.76b0000.29.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0x3d99:$x1: NanoCore.ClientPluginHost
  • 0x3db3:$x2: IClientNetworkHost
Click to see the 288 entries

AV Detection

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\3yIxxU5Wko.exe, ProcessId: 5480, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

E-Banking Fraud

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\3yIxxU5Wko.exe, ProcessId: 5480, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Persistence and Installation Behavior

barindex
Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpFB74.tmp, CommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpFB74.tmp, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\3yIxxU5Wko.exe, ParentImage: C:\Users\user\Desktop\3yIxxU5Wko.exe, ParentProcessId: 5480, ParentProcessName: 3yIxxU5Wko.exe, ProcessCommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpFB74.tmp, ProcessId: 320, ProcessName: schtasks.exe

Stealing of Sensitive Information

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\3yIxxU5Wko.exe, ProcessId: 5480, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Remote Access Functionality

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\3yIxxU5Wko.exe, ProcessId: 5480, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
Timestamp:192.168.2.645.12.253.264971816652816766 02/02/23-08:01:58.369947
SID:2816766
Source Port:49718
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:45.12.253.26192.168.2.61665497152841753 02/02/23-08:01:51.077424
SID:2841753
Source Port:1665
Destination Port:49715
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.645.12.253.264971316652816766 02/02/23-08:01:29.730882
SID:2816766
Source Port:49713
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.645.12.253.264971416652816766 02/02/23-08:01:39.744017
SID:2816766
Source Port:49714
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.645.12.253.264971516652816766 02/02/23-08:01:51.165371
SID:2816766
Source Port:49715
Destination Port:1665
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:45.12.253.26192.168.2.61665497182810290 02/02/23-08:01:58.690998
SID:2810290
Source Port:1665
Destination Port:49718
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:45.12.253.26192.168.2.61665497182841753 02/02/23-08:01:58.903710
SID:2841753
Source Port:1665
Destination Port:49718
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 3yIxxU5Wko.exeReversingLabs: Detection: 28%
Source: tzitziklishop.ddns.netAvira URL Cloud: Label: malware
Source: tzitziklishop.ddns.netVirustotal: Detection: 12%Perma Link
Source: tzitziklishop.ddns.netVirustotal: Detection: 12%Perma Link
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 28%
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.3ad4c1d.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4975628.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.452e0a8.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.64a4629.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.49707f2.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.44fb488.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.485b0b5.14.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.64a0000.20.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4ad1392.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.64a0000.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.44fb488.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.452e0a8.10.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4975628.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.484ee81.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.3acb7be.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.44b0e68.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.486f6e2.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4979c51.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4ada7f1.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000012.00000002.344314956.0000000003A89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.336403877.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.265161826.0000000004019000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.341772229.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.345914663.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000002.533150179.00000000064A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.265161826.00000000044B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: 3yIxxU5Wko.exe PID: 5192, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: 3yIxxU5Wko.exe PID: 5480, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: 3yIxxU5Wko.exe PID: 2376, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4500, type: MEMORYSTR
Source: 3yIxxU5Wko.exeJoe Sandbox ML: detected
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
Source: 2.2.3yIxxU5Wko.exe.64a0000.20.unpackAvira: Label: TR/NanoCore.fadte
Source: 18.2.3yIxxU5Wko.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 00000012.00000002.344314956.0000000003A89000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "be28fce4-4930-4ffe-96ed-0110cf99", "Group": "SecureKMT", "Domain1": "tzitziklishop.ddns.net", "Domain2": "127.0.0.1", "Port": 1665, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
Source: 3yIxxU5Wko.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 3yIxxU5Wko.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.536233579.00000000073E0000.00000004.08000000.00040000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.536448146.0000000007400000.00000004.08000000.00040000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.536644841.0000000007420000.00000004.08000000.00040000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: 3yIxxU5Wko.exe, 00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.536346079.00000000073F0000.00000004.08000000.00040000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeCode function: 4x nop then jmp 07AC0FCCh0_2_07AC0A4E

Networking

barindex
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49713 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49714 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.12.253.26:1665 -> 192.168.2.6:49715
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49715 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.6:49718 -> 45.12.253.26:1665
Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 45.12.253.26:1665 -> 192.168.2.6:49718
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.12.253.26:1665 -> 192.168.2.6:49718
Source: Malware configuration extractorURLs: tzitziklishop.ddns.net
Source: Malware configuration extractorURLs: 127.0.0.1
Source: unknownDNS query: name: tzitziklishop.ddns.net
Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
Source: Joe Sandbox ViewIP Address: 45.12.253.26 45.12.253.26
Source: global trafficTCP traffic: 192.168.2.6:49713 -> 45.12.253.26:1665
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
Source: 3yIxxU5Wko.exe, 00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://google.com
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248890489.0000000006106000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248047661.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248957423.000000000610A000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248154930.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248008760.0000000006104000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248665387.000000000610A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
Source: 3yIxxU5Wko.exe, 00000000.00000003.248633787.000000000610A000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248890489.0000000006106000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248957423.000000000610A000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248665387.000000000610A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
Source: 3yIxxU5Wko.exe, 00000000.00000003.248154930.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFG
Source: 3yIxxU5Wko.exe, 00000000.00000003.248154930.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comR.TTF
Source: 3yIxxU5Wko.exe, 00000000.00000003.260510699.0000000006106000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comac
Source: 3yIxxU5Wko.exe, 00000000.00000003.248633787.000000000610A000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248890489.0000000006106000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248957423.000000000610A000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248665387.000000000610A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsd
Source: 3yIxxU5Wko.exe, 00000000.00000003.248890489.0000000006106000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248957423.000000000610A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcom
Source: 3yIxxU5Wko.exe, 00000000.00000003.248154930.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd5
Source: 3yIxxU5Wko.exe, 00000000.00000003.260510699.0000000006106000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.come.com
Source: 3yIxxU5Wko.exe, 00000000.00000003.248957423.000000000610A000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248154930.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessed
Source: 3yIxxU5Wko.exe, 00000000.00000003.248047661.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248154930.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgrita
Source: 3yIxxU5Wko.exe, 00000000.00000003.248890489.0000000006106000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248957423.000000000610A000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248665387.000000000610A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgrito
Source: 3yIxxU5Wko.exe, 00000000.00000003.260510699.0000000006106000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comldv
Source: 3yIxxU5Wko.exe, 00000000.00000003.248633787.000000000610A000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248890489.0000000006106000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248957423.000000000610A000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248665387.000000000610A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comttodh
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.244936759.00000000060F2000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.245120597.00000000060F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: 3yIxxU5Wko.exe, 00000000.00000003.244185923.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/y/
Source: 3yIxxU5Wko.exe, 00000000.00000003.250069545.0000000006108000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.250279044.0000000006107000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: 3yIxxU5Wko.exe, 00000000.00000003.250191139.0000000006107000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.249911417.0000000006108000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.249982918.0000000006108000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.250069545.0000000006108000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.250363742.0000000006106000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.250279044.0000000006107000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htme
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246594659.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246548104.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246804982.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: 3yIxxU5Wko.exe, 00000000.00000003.246594659.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246548104.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246804982.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/5
Source: 3yIxxU5Wko.exe, 00000000.00000003.246594659.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246548104.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246804982.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/8
Source: 3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Q
Source: 3yIxxU5Wko.exe, 00000000.00000003.246594659.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247048926.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246548104.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246957227.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246881598.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246931816.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247027959.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246804982.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
Source: 3yIxxU5Wko.exe, 00000000.00000003.246594659.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246548104.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246804982.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y00
Source: 3yIxxU5Wko.exe, 00000000.00000003.247230845.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246594659.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247048926.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247202053.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246548104.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246957227.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246881598.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247102368.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246931816.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247027959.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246804982.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
Source: 3yIxxU5Wko.exe, 00000000.00000003.247230845.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246594659.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247301851.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247048926.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247202053.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246548104.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246957227.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246881598.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247102368.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246931816.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247027959.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246804982.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247272353.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/L
Source: 3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/c
Source: 3yIxxU5Wko.exe, 00000000.00000003.247230845.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246594659.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247048926.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247202053.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246548104.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246957227.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246881598.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247102368.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246931816.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247027959.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246804982.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247272353.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/keb
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
Source: 3yIxxU5Wko.exe, 00000000.00000003.242410464.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.coma
Source: 3yIxxU5Wko.exe, 00000000.00000003.242410464.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comeY
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.244999013.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.245035032.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
Source: 3yIxxU5Wko.exe, 00000000.00000003.245029033.000000000612F000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.245212729.000000000612E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comB
Source: 3yIxxU5Wko.exe, 00000000.00000003.245035032.000000000610B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comT=
Source: 3yIxxU5Wko.exe, 00000000.00000003.245029033.000000000612F000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.245212729.000000000612E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.coml
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
Source: 3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
Source: unknownDNS traffic detected: queries for: tzitziklishop.ddns.net
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

E-Banking Fraud

barindex
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.3ad4c1d.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4975628.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.452e0a8.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.64a4629.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.49707f2.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.44fb488.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.485b0b5.14.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.64a0000.20.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4ad1392.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.64a0000.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.44fb488.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.452e0a8.10.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4975628.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.484ee81.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.3acb7be.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.44b0e68.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.486f6e2.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4979c51.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4ada7f1.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000012.00000002.344314956.0000000003A89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.336403877.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.265161826.0000000004019000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.341772229.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.345914663.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000002.533150179.00000000064A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.265161826.00000000044B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: 3yIxxU5Wko.exe PID: 5192, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: 3yIxxU5Wko.exe PID: 5480, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: 3yIxxU5Wko.exe PID: 2376, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4500, type: MEMORYSTR

System Summary

barindex
Source: 2.2.3yIxxU5Wko.exe.73f0000.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.73f0000.25.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.73f0000.25.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.76b0000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.76b0000.29.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.76b0000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.3yIxxU5Wko.exe.316024c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.76d0000.30.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.76d0000.30.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.76d0000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.73f0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.73f0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.73f0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 18.2.3yIxxU5Wko.exe.3ad4c1d.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 18.2.3yIxxU5Wko.exe.3ad4c1d.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 18.2.3yIxxU5Wko.exe.3ad4c1d.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.73e0000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.73e0000.24.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.73e0000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.7860000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.7860000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.7860000.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.485b0b5.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.485b0b5.14.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.485b0b5.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.4a592fe.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.4a592fe.16.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.4a592fe.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.4975628.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.4975628.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.4975628.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.3yIxxU5Wko.exe.452e0a8.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 0.2.3yIxxU5Wko.exe.452e0a8.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.3yIxxU5Wko.exe.452e0a8.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.3yIxxU5Wko.exe.452e0a8.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.6bf0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.6bf0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.6bf0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.783e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.783e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.783e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.73e0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.73e0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.73e0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.2f5577c.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.2f5577c.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.2f5577c.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.55f0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.55f0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.55f0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.64a4629.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.64a4629.19.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.64a4629.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.7410000.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.7410000.27.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.7410000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 8.2.dhcpmon.exe.2d83f2c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.49707f2.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.49707f2.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.49707f2.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 2.2.3yIxxU5Wko.exe.49707f2.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.7390000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.7390000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.7390000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.4a4209f.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.4a4209f.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.4a4209f.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 2.2.3yIxxU5Wko.exe.4a4209f.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.484ee81.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.484ee81.11.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.484ee81.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.6bf0000.22.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.6bf0000.22.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.6bf0000.22.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.76b0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.76b0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.76b0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.4a4aece.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.4a4aece.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.4a4aece.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.2f619c4.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.2f619c4.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.2f619c4.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.7400000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.7400000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.7400000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.2f76000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.2f76000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.2f76000.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 2.2.3yIxxU5Wko.exe.2f76000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.3yIxxU5Wko.exe.44fb488.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 0.2.3yIxxU5Wko.exe.44fb488.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.3yIxxU5Wko.exe.44fb488.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.3yIxxU5Wko.exe.44fb488.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.485b0b5.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.485b0b5.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 2.2.3yIxxU5Wko.exe.485b0b5.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.64a0000.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.64a0000.20.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.64a0000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.4ad1392.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.4ad1392.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 2.2.3yIxxU5Wko.exe.4ad1392.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.4a592fe.16.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.4a592fe.16.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.4a592fe.16.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.64a0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 8.2.dhcpmon.exe.2d60280.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
Source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.64a0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.64a0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.2efcc2c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.2efcc2c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.2efcc2c.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.7420000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.7420000.28.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.7420000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.7420000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.7420000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 20.2.dhcpmon.exe.2b29688.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 20.2.dhcpmon.exe.2b29688.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 20.2.dhcpmon.exe.2b29688.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.7420000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.7390000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.7390000.23.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.7390000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.7830000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.7830000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.7830000.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.76d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.76d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.76d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.3yIxxU5Wko.exe.44fb488.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 0.2.3yIxxU5Wko.exe.44fb488.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.3yIxxU5Wko.exe.44fb488.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.3yIxxU5Wko.exe.44fb488.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.3yIxxU5Wko.exe.452e0a8.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 0.2.3yIxxU5Wko.exe.452e0a8.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.3yIxxU5Wko.exe.452e0a8.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.3yIxxU5Wko.exe.452e0a8.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.7410000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.7410000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.7410000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.4a4aece.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.4a4aece.15.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.4a4aece.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.7834c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.7834c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.7834c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.4a4209f.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.4a4209f.13.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.4a4209f.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.4975628.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.4975628.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.4975628.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 2.2.3yIxxU5Wko.exe.4975628.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.7860000.34.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.7860000.34.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.7860000.34.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.484ee81.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.484ee81.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 2.2.3yIxxU5Wko.exe.484ee81.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 18.2.3yIxxU5Wko.exe.2ae95bc.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 18.2.3yIxxU5Wko.exe.2ae95bc.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 18.2.3yIxxU5Wko.exe.2ae95bc.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.3yIxxU5Wko.exe.3183ef8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.2f5577c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.2f5577c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.2f5577c.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 2.2.3yIxxU5Wko.exe.2f5577c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.7830000.31.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.7830000.31.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.7830000.31.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 18.2.3yIxxU5Wko.exe.3acb7be.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 18.2.3yIxxU5Wko.exe.3acb7be.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 18.2.3yIxxU5Wko.exe.3acb7be.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 18.2.3yIxxU5Wko.exe.3acb7be.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.3yIxxU5Wko.exe.44b0e68.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 0.2.3yIxxU5Wko.exe.44b0e68.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.3yIxxU5Wko.exe.44b0e68.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.3yIxxU5Wko.exe.44b0e68.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.486f6e2.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.486f6e2.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.486f6e2.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 2.2.3yIxxU5Wko.exe.486f6e2.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.4979c51.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.4979c51.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.4979c51.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 2.2.3yIxxU5Wko.exe.4979c51.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.2f619c4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 2.2.3yIxxU5Wko.exe.2f619c4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.2f619c4.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 2.2.3yIxxU5Wko.exe.2f619c4.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 2.2.3yIxxU5Wko.exe.4ada7f1.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 2.2.3yIxxU5Wko.exe.4ada7f1.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 2.2.3yIxxU5Wko.exe.4ada7f1.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000002.532206387.00000000055F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000002.00000002.532206387.00000000055F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000002.00000002.532206387.00000000055F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000012.00000002.344314956.0000000003A89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000012.00000002.344314956.0000000003A89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000002.537510131.0000000007830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000002.00000002.537510131.0000000007830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000002.00000002.537510131.0000000007830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000002.509135114.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000002.536448146.0000000007400000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000002.00000002.536448146.0000000007400000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000002.00000002.536448146.0000000007400000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000002.534992759.0000000006BF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000002.00000002.534992759.0000000006BF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000002.00000002.534992759.0000000006BF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000012.00000002.336403877.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000012.00000002.336403877.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000012.00000002.336403877.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000000.00000002.265161826.0000000004019000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000000.00000002.265161826.0000000004019000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.265161826.0000000004019000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000002.536233579.00000000073E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000002.00000002.536233579.00000000073E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000002.00000002.536233579.00000000073E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000002.535807006.0000000007390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000002.00000002.535807006.0000000007390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000002.00000002.535807006.0000000007390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000002.537164844.00000000076D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000002.00000002.537164844.00000000076D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000002.00000002.537164844.00000000076D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000012.00000002.341772229.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000012.00000002.341772229.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000002.536346079.00000000073F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000002.00000002.536346079.00000000073F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000002.00000002.536346079.00000000073F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000002.536644841.0000000007420000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000002.00000002.536644841.0000000007420000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000002.00000002.536644841.0000000007420000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000002.536904085.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000002.00000002.536904085.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000002.00000002.536904085.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000014.00000002.345914663.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000014.00000002.345914663.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000002.533150179.00000000064A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000002.00000002.533150179.00000000064A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000002.00000002.533150179.00000000064A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000003.282621709.0000000006851000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000000.00000002.265161826.00000000044B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000000.00000002.265161826.00000000044B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.265161826.00000000044B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000002.537796470.0000000007860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000002.00000002.537796470.0000000007860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000002.00000002.537796470.0000000007860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: 3yIxxU5Wko.exe PID: 5192, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: Process Memory Space: 3yIxxU5Wko.exe PID: 5192, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: 3yIxxU5Wko.exe PID: 5192, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: 3yIxxU5Wko.exe PID: 5480, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: 3yIxxU5Wko.exe PID: 5480, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: 3yIxxU5Wko.exe PID: 2376, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: Process Memory Space: 3yIxxU5Wko.exe PID: 2376, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: 3yIxxU5Wko.exe PID: 2376, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: dhcpmon.exe PID: 4500, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: dhcpmon.exe PID: 4500, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 3yIxxU5Wko.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 2.2.3yIxxU5Wko.exe.73f0000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.73f0000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.73f0000.25.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.73f0000.25.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.76b0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.76b0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.76b0000.29.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.76b0000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.3yIxxU5Wko.exe.316024c.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
Source: 2.2.3yIxxU5Wko.exe.76d0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.76d0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.76d0000.30.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.76d0000.30.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.73f0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.73f0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.73f0000.25.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.73f0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 18.2.3yIxxU5Wko.exe.3ad4c1d.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.3yIxxU5Wko.exe.3ad4c1d.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.3yIxxU5Wko.exe.3ad4c1d.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 18.2.3yIxxU5Wko.exe.3ad4c1d.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.73e0000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.73e0000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.73e0000.24.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.73e0000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.7860000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7860000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7860000.34.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.7860000.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.485b0b5.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.485b0b5.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.485b0b5.14.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.485b0b5.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.4a592fe.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4a592fe.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4a592fe.16.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.4a592fe.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.4975628.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4975628.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4975628.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.4975628.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.3yIxxU5Wko.exe.452e0a8.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.3yIxxU5Wko.exe.452e0a8.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.3yIxxU5Wko.exe.452e0a8.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.3yIxxU5Wko.exe.452e0a8.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.3yIxxU5Wko.exe.452e0a8.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.6bf0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.6bf0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.6bf0000.22.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.6bf0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.783e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.783e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.783e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.783e8a4.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.73e0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.73e0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.73e0000.24.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.73e0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.2f5577c.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.2f5577c.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.2f5577c.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.2f5577c.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.55f0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.55f0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.55f0000.18.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.55f0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.64a4629.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.64a4629.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.64a4629.19.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.64a4629.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.7410000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7410000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7410000.27.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.7410000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 8.2.dhcpmon.exe.2d83f2c.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
Source: 2.2.3yIxxU5Wko.exe.49707f2.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.49707f2.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.49707f2.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.49707f2.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 2.2.3yIxxU5Wko.exe.49707f2.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.7390000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7390000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7390000.23.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.7390000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.4a4209f.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4a4209f.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4a4209f.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.4a4209f.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 2.2.3yIxxU5Wko.exe.4a4209f.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.484ee81.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.484ee81.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.484ee81.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.484ee81.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.6bf0000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.6bf0000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.6bf0000.22.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.6bf0000.22.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.76b0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.76b0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.76b0000.29.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.76b0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.4a4aece.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4a4aece.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4a4aece.15.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.4a4aece.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.2f619c4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.2f619c4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.2f619c4.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.2f619c4.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.7400000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7400000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7400000.26.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.7400000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.2f76000.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.2f76000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.2f76000.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 2.2.3yIxxU5Wko.exe.2f76000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.3yIxxU5Wko.exe.44fb488.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.3yIxxU5Wko.exe.44fb488.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.3yIxxU5Wko.exe.44fb488.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.3yIxxU5Wko.exe.44fb488.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.3yIxxU5Wko.exe.44fb488.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.485b0b5.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.485b0b5.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 2.2.3yIxxU5Wko.exe.485b0b5.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.64a0000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.64a0000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.64a0000.20.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.64a0000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.4ad1392.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.4ad1392.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 2.2.3yIxxU5Wko.exe.4ad1392.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.4a592fe.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4a592fe.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4a592fe.16.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.4a592fe.16.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.64a0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.64a0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 8.2.dhcpmon.exe.2d60280.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
Source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.64a0000.20.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.64a0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.2efcc2c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.2efcc2c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.2efcc2c.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.2efcc2c.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.7420000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7420000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7420000.28.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.7420000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.7420000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7420000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7420000.28.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 20.2.dhcpmon.exe.2b29688.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 20.2.dhcpmon.exe.2b29688.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 20.2.dhcpmon.exe.2b29688.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 20.2.dhcpmon.exe.2b29688.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.7420000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.7390000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7390000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7390000.23.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.7390000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.7830000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7830000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7830000.31.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.7830000.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.76d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.76d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.76d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.76d0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.3yIxxU5Wko.exe.44fb488.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.3yIxxU5Wko.exe.44fb488.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.3yIxxU5Wko.exe.44fb488.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.3yIxxU5Wko.exe.44fb488.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.3yIxxU5Wko.exe.44fb488.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.3yIxxU5Wko.exe.452e0a8.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.3yIxxU5Wko.exe.452e0a8.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.3yIxxU5Wko.exe.452e0a8.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.3yIxxU5Wko.exe.452e0a8.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.3yIxxU5Wko.exe.452e0a8.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.7410000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7410000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7410000.27.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.7410000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.4a4aece.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4a4aece.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4a4aece.15.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.4a4aece.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.7834c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7834c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7834c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.7834c9f.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.4a4209f.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4a4209f.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4a4209f.13.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.4a4209f.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.4975628.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4975628.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4975628.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.4975628.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 2.2.3yIxxU5Wko.exe.4975628.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.7860000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7860000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7860000.34.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.7860000.34.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.484ee81.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.484ee81.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 2.2.3yIxxU5Wko.exe.484ee81.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 18.2.3yIxxU5Wko.exe.2ae95bc.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.3yIxxU5Wko.exe.2ae95bc.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.3yIxxU5Wko.exe.2ae95bc.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 18.2.3yIxxU5Wko.exe.2ae95bc.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.3yIxxU5Wko.exe.3183ef8.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
Source: 2.2.3yIxxU5Wko.exe.2f5577c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.2f5577c.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.2f5577c.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 2.2.3yIxxU5Wko.exe.2f5577c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.7830000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7830000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.7830000.31.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.7830000.31.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 18.2.3yIxxU5Wko.exe.3acb7be.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.3yIxxU5Wko.exe.3acb7be.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.3yIxxU5Wko.exe.3acb7be.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 18.2.3yIxxU5Wko.exe.3acb7be.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 18.2.3yIxxU5Wko.exe.3acb7be.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.3yIxxU5Wko.exe.44b0e68.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.3yIxxU5Wko.exe.44b0e68.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.3yIxxU5Wko.exe.44b0e68.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.3yIxxU5Wko.exe.44b0e68.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.486f6e2.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.486f6e2.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.486f6e2.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 2.2.3yIxxU5Wko.exe.486f6e2.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.4979c51.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4979c51.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.4979c51.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.4979c51.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 2.2.3yIxxU5Wko.exe.4979c51.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.2f619c4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 2.2.3yIxxU5Wko.exe.2f619c4.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.2f619c4.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 2.2.3yIxxU5Wko.exe.2f619c4.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 2.2.3yIxxU5Wko.exe.4ada7f1.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 2.2.3yIxxU5Wko.exe.4ada7f1.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 2.2.3yIxxU5Wko.exe.4ada7f1.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000002.532206387.00000000055F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.532206387.00000000055F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.532206387.00000000055F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000002.00000002.532206387.00000000055F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000012.00000002.344314956.0000000003A89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000012.00000002.344314956.0000000003A89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000002.537510131.0000000007830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.537510131.0000000007830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.537510131.0000000007830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000002.00000002.537510131.0000000007830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000002.509135114.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000002.536448146.0000000007400000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.536448146.0000000007400000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.536448146.0000000007400000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000002.00000002.536448146.0000000007400000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000002.534992759.0000000006BF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.534992759.0000000006BF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.534992759.0000000006BF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000002.00000002.534992759.0000000006BF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000012.00000002.336403877.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000012.00000002.336403877.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000012.00000002.336403877.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000000.00000002.265161826.0000000004019000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.265161826.0000000004019000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.265161826.0000000004019000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000002.536233579.00000000073E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.536233579.00000000073E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.536233579.00000000073E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000002.00000002.536233579.00000000073E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000002.535807006.0000000007390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.535807006.0000000007390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.535807006.0000000007390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000002.00000002.535807006.0000000007390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000002.537164844.00000000076D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.537164844.00000000076D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.537164844.00000000076D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000002.00000002.537164844.00000000076D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000012.00000002.341772229.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000012.00000002.341772229.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000002.536346079.00000000073F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.536346079.00000000073F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.536346079.00000000073F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000002.00000002.536346079.00000000073F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000002.536644841.0000000007420000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.536644841.0000000007420000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.536644841.0000000007420000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000002.00000002.536644841.0000000007420000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000002.536904085.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.536904085.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.536904085.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000002.00000002.536904085.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000014.00000002.345914663.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000014.00000002.345914663.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000002.533150179.00000000064A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.533150179.00000000064A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.533150179.00000000064A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000002.00000002.533150179.00000000064A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000003.282621709.0000000006851000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000000.00000002.265161826.00000000044B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.265161826.00000000044B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.265161826.00000000044B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000002.537796470.0000000007860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.537796470.0000000007860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000002.00000002.537796470.0000000007860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000002.00000002.537796470.0000000007860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: 3yIxxU5Wko.exe PID: 5192, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: 3yIxxU5Wko.exe PID: 5192, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: 3yIxxU5Wko.exe PID: 5192, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: 3yIxxU5Wko.exe PID: 5480, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: 3yIxxU5Wko.exe PID: 5480, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: 3yIxxU5Wko.exe PID: 2376, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: 3yIxxU5Wko.exe PID: 2376, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: 3yIxxU5Wko.exe PID: 2376, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: dhcpmon.exe PID: 4500, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: dhcpmon.exe PID: 4500, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeCode function: 0_2_02E9C58C0_2_02E9C58C
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeCode function: 0_2_02E9E52A0_2_02E9E52A
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeCode function: 0_2_02E9E5300_2_02E9E530
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeCode function: 0_2_07B000060_2_07B00006
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeCode function: 0_2_07B000400_2_07B00040
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeCode function: 2_2_06C000402_2_06C00040
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeCode function: 2_2_078736F02_2_078736F0
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeCode function: 2_2_078648EF2_2_078648EF
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeCode function: 2_2_02E7E4802_2_02E7E480
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeCode function: 2_2_02E7BBD42_2_02E7BBD4
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeCode function: 2_2_07181F582_2_07181F58
Source: 3yIxxU5Wko.exe, 00000000.00000002.285163248.0000000007950000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000000.00000000.239628548.0000000000CE2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameOtxi.exeB vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000000.00000002.265161826.00000000041AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exeBinary or memory string: OriginalFilename vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.537796470.000000000786E000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.537164844.00000000076D8000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.533305288.0000000006600000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.537510131.0000000007830000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.537510131.0000000007830000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.537510131.0000000007858000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.534992759.0000000006BF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.536448146.0000000007400000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.536233579.00000000073E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.535807006.0000000007390000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.536346079.00000000073F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.536644841.0000000007420000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.536904085.00000000076B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.533150179.00000000064A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.533150179.00000000064A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000003.282621709.0000000006851000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000007.00000002.308478844.0000000003FA0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000007.00000002.308478844.0000000003F1E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000007.00000002.302555692.0000000001079000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000012.00000002.338528239.0000000000DE9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000012.00000002.344314956.0000000003A89000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000012.00000002.344314956.0000000003A89000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000012.00000002.344314956.0000000003A89000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000012.00000002.341772229.0000000002A81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exe, 00000012.00000002.341772229.0000000002A81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exeBinary or memory string: OriginalFilenameOtxi.exeB vs 3yIxxU5Wko.exe
Source: 3yIxxU5Wko.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: dhcpmon.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 3yIxxU5Wko.exeReversingLabs: Detection: 28%
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeFile read: C:\Users\user\Desktop\3yIxxU5Wko.exeJump to behavior
Source: 3yIxxU5Wko.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\3yIxxU5Wko.exe C:\Users\user\Desktop\3yIxxU5Wko.exe
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Users\user\Desktop\3yIxxU5Wko.exe C:\Users\user\Desktop\3yIxxU5Wko.exe
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Users\user\Desktop\3yIxxU5Wko.exe C:\Users\user\Desktop\3yIxxU5Wko.exe
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpFB74.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpFD98.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\user\Desktop\3yIxxU5Wko.exe C:\Users\user\Desktop\3yIxxU5Wko.exe 0
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Users\user\Desktop\3yIxxU5Wko.exe C:\Users\user\Desktop\3yIxxU5Wko.exe
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Users\user\Desktop\3yIxxU5Wko.exe C:\Users\user\Desktop\3yIxxU5Wko.exe
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Users\user\Desktop\3yIxxU5Wko.exe C:\Users\user\Desktop\3yIxxU5Wko.exeJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Users\user\Desktop\3yIxxU5Wko.exe C:\Users\user\Desktop\3yIxxU5Wko.exeJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpFB74.tmpJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpFD98.tmpJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Users\user\Desktop\3yIxxU5Wko.exe C:\Users\user\Desktop\3yIxxU5Wko.exeJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Users\user\Desktop\3yIxxU5Wko.exe C:\Users\user\Desktop\3yIxxU5Wko.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3yIxxU5Wko.exe.logJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeFile created: C:\Users\user\AppData\Local\Temp\tmpFB74.tmpJump to behavior
Source: classification engineClassification label: mal100.troj.evad.winEXE@25/11@6/1
Source: 3yIxxU5Wko.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3108:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3732:120:WilError_01
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{be28fce4-4930-4ffe-96ed-0110cf99b889}
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5348:120:WilError_01
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
Source: 3yIxxU5Wko.exe, 00000000.00000003.244046979.000000000610B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: a trademark of the Microsoft group of companies.slnt
Source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
Source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: 3yIxxU5Wko.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: 3yIxxU5Wko.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.536233579.00000000073E0000.00000004.08000000.00040000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.536448146.0000000007400000.00000004.08000000.00040000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.536644841.0000000007420000.00000004.08000000.00040000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: 3yIxxU5Wko.exe, 00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.536346079.00000000073F0000.00000004.08000000.00040000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeCode function: 0_2_02E9E390 push eax; ret 0_2_02E9E391
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeCode function: 0_2_02E9F920 pushad ; iretd 0_2_02E9F921
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeCode function: 0_2_07AC418D push FFFFFF8Bh; iretd 0_2_07AC418F
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeCode function: 0_2_07B03E0F push ebp; ret 0_2_07B03E12
Source: initial sampleStatic PE information: section name: .text entropy: 7.679578810089011
Source: initial sampleStatic PE information: section name: .text entropy: 7.679578810089011
Source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpFB74.tmp

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeFile opened: C:\Users\user\Desktop\3yIxxU5Wko.exe:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.316024c.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.dhcpmon.exe.2d83f2c.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 8.2.dhcpmon.exe.2d60280.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.3183ef8.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000000.00000002.262140358.0000000003160000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.317358866.0000000002D60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: 3yIxxU5Wko.exe PID: 5192, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4976, type: MEMORYSTR
Source: 3yIxxU5Wko.exe, 00000000.00000002.262140358.0000000003160000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000008.00000002.317358866.0000000002D60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
Source: 3yIxxU5Wko.exe, 00000000.00000002.262140358.0000000003160000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000008.00000002.317358866.0000000002D60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
Source: C:\Users\user\Desktop\3yIxxU5Wko.exe TID: 5216Thread sleep time: -37665s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exe TID: 5188Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exe TID: 5364Thread sleep time: -3689348814741908s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exe TID: 4764Thread sleep time: -37665s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exe TID: 4844Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5384Thread sleep time: -37665s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5404Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5264Thread sleep time: -37665s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5500Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exe TID: 4788Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2120Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4508Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeWindow / User API: threadDelayed 9467Jump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeWindow / User API: foregroundWindowGot 627Jump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeWindow / User API: foregroundWindowGot 560Jump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeThread delayed: delay time: 37665Jump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeThread delayed: delay time: 37665Jump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 37665Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 37665Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: dhcpmon.exe, 00000008.00000002.317358866.0000000002D60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: dhcpmon.exe, 00000008.00000002.317358866.0000000002D60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
Source: dhcpmon.exe, 00000008.00000002.317358866.0000000002D60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
Source: dhcpmon.exe, 00000008.00000002.317358866.0000000002D60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess token adjusted: DebugJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeMemory written: C:\Users\user\Desktop\3yIxxU5Wko.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeMemory written: C:\Users\user\Desktop\3yIxxU5Wko.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Users\user\Desktop\3yIxxU5Wko.exe C:\Users\user\Desktop\3yIxxU5Wko.exeJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Users\user\Desktop\3yIxxU5Wko.exe C:\Users\user\Desktop\3yIxxU5Wko.exeJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpFB74.tmpJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpFD98.tmpJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Users\user\Desktop\3yIxxU5Wko.exe C:\Users\user\Desktop\3yIxxU5Wko.exeJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeProcess created: C:\Users\user\Desktop\3yIxxU5Wko.exe C:\Users\user\Desktop\3yIxxU5Wko.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.000000000335B000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.538216286.0000000007F4E000.00000004.00000010.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.533707111.000000000684C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: 3yIxxU5Wko.exe, 00000002.00000002.537469866.000000000782E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managert
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.00000000034FC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager4
Source: 3yIxxU5Wko.exe, 00000002.00000002.538155602.0000000007D4B000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000003091000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerHa
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Users\user\Desktop\3yIxxU5Wko.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Users\user\Desktop\3yIxxU5Wko.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Users\user\Desktop\3yIxxU5Wko.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Users\user\Desktop\3yIxxU5Wko.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\3yIxxU5Wko.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct

Stealing of Sensitive Information

barindex
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.3ad4c1d.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4975628.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.452e0a8.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.64a4629.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.49707f2.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.44fb488.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.485b0b5.14.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.64a0000.20.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4ad1392.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.64a0000.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.44fb488.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.452e0a8.10.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4975628.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.484ee81.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.3acb7be.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.44b0e68.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.486f6e2.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4979c51.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4ada7f1.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000012.00000002.344314956.0000000003A89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.336403877.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.265161826.0000000004019000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.341772229.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.345914663.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000002.533150179.00000000064A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.265161826.00000000044B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: 3yIxxU5Wko.exe PID: 5192, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: 3yIxxU5Wko.exe PID: 5480, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: 3yIxxU5Wko.exe PID: 2376, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4500, type: MEMORYSTR

Remote Access Functionality

barindex
Source: 3yIxxU5Wko.exe, 00000000.00000002.265161826.0000000004019000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000000.00000002.265161826.00000000044B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exeString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: 3yIxxU5Wko.exe, 00000002.00000002.537510131.0000000007830000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: 3yIxxU5Wko.exe, 00000002.00000002.534992759.0000000006BF0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000002.00000002.536448146.0000000007400000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000002.00000002.536448146.0000000007400000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: 3yIxxU5Wko.exe, 00000002.00000002.536233579.00000000073E0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000002.00000002.535807006.0000000007390000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000002.00000002.537164844.00000000076D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000002.00000002.536346079.00000000073F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000002.00000002.536346079.00000000073F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: 3yIxxU5Wko.exe, 00000002.00000002.536644841.0000000007420000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000002.00000002.536644841.0000000007420000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: 3yIxxU5Wko.exe, 00000002.00000002.536904085.00000000076B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: 3yIxxU5Wko.exe, 00000002.00000002.533150179.00000000064A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000002.00000003.282621709.0000000006851000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: 3yIxxU5Wko.exe, 00000002.00000002.537796470.0000000007860000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000012.00000002.344314956.0000000003A89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000012.00000002.344314956.0000000003A89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: 3yIxxU5Wko.exe, 00000012.00000002.336403877.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000012.00000002.341772229.0000000002A81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: 3yIxxU5Wko.exe, 00000012.00000002.341772229.0000000002A81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: dhcpmon.exe, 00000014.00000002.345914663.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 00000014.00000002.345914663.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.3ad4c1d.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4975628.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.452e0a8.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.64a4629.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.49707f2.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.44fb488.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.485b0b5.14.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.64a0000.20.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4ad1392.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.64a0000.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.44fb488.12.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.452e0a8.10.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4975628.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.484ee81.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.3ad05f4.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.3acb7be.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.3yIxxU5Wko.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.3yIxxU5Wko.exe.44b0e68.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.486f6e2.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4ad61c8.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4979c51.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 2.2.3yIxxU5Wko.exe.4ada7f1.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000012.00000002.344314956.0000000003A89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.336403877.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.265161826.0000000004019000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.341772229.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000014.00000002.345914663.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000002.533150179.00000000064A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.265161826.00000000044B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: 3yIxxU5Wko.exe PID: 5192, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: 3yIxxU5Wko.exe PID: 5480, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: 3yIxxU5Wko.exe PID: 2376, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4500, type: MEMORYSTR
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Windows Management Instrumentation
1
Scheduled Task/Job
112
Process Injection
2
Masquerading
11
Input Capture
211
Security Software Discovery
Remote Services11
Input Capture
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Scheduled Task/Job
Boot or Logon Initialization Scripts1
Scheduled Task/Job
1
Disable or Modify Tools
LSASS Memory2
Process Discovery
Remote Desktop Protocol11
Archive Collected Data
Exfiltration Over Bluetooth1
Non-Standard Port
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
Virtualization/Sandbox Evasion
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Remote Access Software
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer1
Non-Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets12
System Information Discovery
SSHKeyloggingData Transfer Size Limits21
Application Layer Protocol
Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
Hidden Files and Directories
Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup Items3
Obfuscated Files or Information
DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job13
Software Packing
Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 796775 Sample: 3yIxxU5Wko.exe Startdate: 02/02/2023 Architecture: WINDOWS Score: 100 57 Snort IDS alert for network traffic 2->57 59 Multi AV Scanner detection for domain / URL 2->59 61 Malicious sample detected (through community Yara rule) 2->61 63 14 other signatures 2->63 8 3yIxxU5Wko.exe 3 2->8         started        12 dhcpmon.exe 3 2->12         started        14 3yIxxU5Wko.exe 2 2->14         started        16 dhcpmon.exe 2 2->16         started        process3 file4 53 C:\Users\user\AppData\...\3yIxxU5Wko.exe.log, ASCII 8->53 dropped 67 Uses schtasks.exe or at.exe to add and modify task schedules 8->67 69 Injects a PE file into a foreign processes 8->69 18 3yIxxU5Wko.exe 1 15 8->18         started        23 3yIxxU5Wko.exe 8->23         started        25 dhcpmon.exe 12->25         started        27 dhcpmon.exe 12->27         started        29 3yIxxU5Wko.exe 2 14->29         started        31 3yIxxU5Wko.exe 14->31         started        33 dhcpmon.exe 16->33         started        signatures5 process6 dnsIp7 55 tzitziklishop.ddns.net 45.12.253.26, 1665, 49713, 49714 CMCSUS Germany 18->55 45 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->45 dropped 47 C:\Users\user\AppData\Roaming\...\run.dat, OpenPGP 18->47 dropped 49 C:\Users\user\AppData\Local\...\tmpFB74.tmp, XML 18->49 dropped 51 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 18->51 dropped 65 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->65 35 schtasks.exe 1 18->35         started        37 schtasks.exe 1 18->37         started        39 conhost.exe 18->39         started        file8 signatures9 process10 process11 41 conhost.exe 35->41         started        43 conhost.exe 37->43         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
3yIxxU5Wko.exe28%ReversingLabsWin32.Trojan.Pwsx
3yIxxU5Wko.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe28%ReversingLabsWin32.Trojan.Pwsx
SourceDetectionScannerLabelLinkDownload
2.2.3yIxxU5Wko.exe.64a0000.20.unpack100%AviraTR/NanoCore.fadteDownload File
18.2.3yIxxU5Wko.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
SourceDetectionScannerLabelLink
tzitziklishop.ddns.net12%VirustotalBrowse
SourceDetectionScannerLabelLink
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/jp/L0%URL Reputationsafe
http://www.tiro.com0%URL Reputationsafe
http://www.fontbureau.comessed0%URL Reputationsafe
http://www.fontbureau.comessed0%URL Reputationsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.tiro.comB0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://www.fontbureau.comgrita0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/80%URL Reputationsafe
http://www.jiyu-kobo.co.jp/50%URL Reputationsafe
http://www.jiyu-kobo.co.jp/50%URL Reputationsafe
http://www.jiyu-kobo.co.jp/jp/c0%URL Reputationsafe
http://www.fontbureau.comcom0%URL Reputationsafe
http://www.fontbureau.comldv0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
http://www.fontbureau.comgrito0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.sajatypeworks.coma0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe
http://www.fontbureau.comR.TTF0%URL Reputationsafe
http://www.fontbureau.comalsd0%URL Reputationsafe
http://www.galapagosdesign.com/0%URL Reputationsafe
http://www.fontbureau.comF0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/Q0%URL Reputationsafe
tzitziklishop.ddns.net100%Avira URL Cloudmalware
http://www.sajatypeworks.comeY0%Avira URL Cloudsafe
http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
http://www.fontbureau.comd50%Avira URL Cloudsafe
http://www.fontbureau.comFG0%Avira URL Cloudsafe
http://www.founder.com.cn/cn/y/0%Avira URL Cloudsafe
http://www.tiro.comT=0%Avira URL Cloudsafe
tzitziklishop.ddns.net12%VirustotalBrowse
http://www.fontbureau.come.com0%URL Reputationsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.tiro.coml0%URL Reputationsafe
http://www.fontbureau.comac0%Avira URL Cloudsafe
http://www.galapagosdesign.com/staff/dennis.htme0%Avira URL Cloudsafe
http://www.jiyu-kobo.co.jp/keb0%Avira URL Cloudsafe
127.0.0.10%Avira URL Cloudsafe
http://www.fontbureau.comttodh0%Avira URL Cloudsafe
http://www.jiyu-kobo.co.jp/Y000%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
tzitziklishop.ddns.net
45.12.253.26
truetrueunknown
NameMaliciousAntivirus DetectionReputation
tzitziklishop.ddns.nettrue
  • 12%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
127.0.0.1true
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://www.fontbureau.comd53yIxxU5Wko.exe, 00000000.00000003.248154930.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.fontbureau.com/designersG3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    http://www.fontbureau.com/designers/?3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.founder.com.cn/cn/bThe3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.fontbureau.com/designers?3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.jiyu-kobo.co.jp/jp/L3yIxxU5Wko.exe, 00000000.00000003.247230845.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246594659.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247301851.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247048926.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247202053.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246548104.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246957227.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246881598.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247102368.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246931816.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247027959.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246804982.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247272353.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.fontbureau.comFG3yIxxU5Wko.exe, 00000000.00000003.248154930.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.tiro.com3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.244999013.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.245035032.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.fontbureau.com/designers3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.fontbureau.comessed3yIxxU5Wko.exe, 00000000.00000003.248957423.000000000610A000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248154930.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.goodfont.co.kr3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://google.com3yIxxU5Wko.exe, 00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.sajatypeworks.comeY3yIxxU5Wko.exe, 00000000.00000003.242410464.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.tiro.comB3yIxxU5Wko.exe, 00000000.00000003.245029033.000000000612F000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.245212729.000000000612E000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.sajatypeworks.com3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.typography.netD3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cn/cThe3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.galapagosdesign.com/staff/dennis.htm3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://fontfabrik.com3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.comgrita3yIxxU5Wko.exe, 00000000.00000003.248047661.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248154930.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/83yIxxU5Wko.exe, 00000000.00000003.246594659.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246548104.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246804982.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/53yIxxU5Wko.exe, 00000000.00000003.246594659.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246548104.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246804982.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cn/y/3yIxxU5Wko.exe, 00000000.00000003.244185923.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jiyu-kobo.co.jp/jp/c3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.tiro.comT=3yIxxU5Wko.exe, 00000000.00000003.245035032.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            low
            http://www.fontbureau.comcom3yIxxU5Wko.exe, 00000000.00000003.248890489.0000000006106000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248957423.000000000610A000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.galapagosdesign.com/staff/dennis.htme3yIxxU5Wko.exe, 00000000.00000003.250191139.0000000006107000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.249911417.0000000006108000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.249982918.0000000006108000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.250069545.0000000006108000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.250363742.0000000006106000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.250279044.0000000006107000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.comldv3yIxxU5Wko.exe, 00000000.00000003.260510699.0000000006106000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.galapagosdesign.com/DPlease3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/Y03yIxxU5Wko.exe, 00000000.00000003.246594659.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247048926.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246548104.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246957227.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246881598.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246931816.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247027959.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246804982.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.comac3yIxxU5Wko.exe, 00000000.00000003.260510699.0000000006106000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.comgrito3yIxxU5Wko.exe, 00000000.00000003.248890489.0000000006106000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248957423.000000000610A000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248665387.000000000610A000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.comttodh3yIxxU5Wko.exe, 00000000.00000003.248633787.000000000610A000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248890489.0000000006106000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248957423.000000000610A000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248665387.000000000610A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fonts.com3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.sandoll.co.kr3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.sajatypeworks.coma3yIxxU5Wko.exe, 00000000.00000003.242410464.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.urwpp.deDPlease3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.zhongyicts.com.cn3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name3yIxxU5Wko.exe, 00000002.00000002.509135114.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.sakkal.com3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.comR.TTF3yIxxU5Wko.exe, 00000000.00000003.248154930.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/keb3yIxxU5Wko.exe, 00000000.00000003.247230845.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246594659.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247048926.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247202053.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246548104.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246957227.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246881598.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247102368.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246931816.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247027959.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246804982.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247272353.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.comalsd3yIxxU5Wko.exe, 00000000.00000003.248633787.000000000610A000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248890489.0000000006106000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248957423.000000000610A000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248665387.000000000610A000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.apache.org/licenses/LICENSE-2.03yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248890489.0000000006106000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248047661.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248957423.000000000610A000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248154930.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248008760.0000000006104000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248665387.000000000610A000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://www.galapagosdesign.com/3yIxxU5Wko.exe, 00000000.00000003.250069545.0000000006108000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.250279044.0000000006107000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.comF3yIxxU5Wko.exe, 00000000.00000003.248633787.000000000610A000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248890489.0000000006106000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248957423.000000000610A000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.248665387.000000000610A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/Q3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/jp/3yIxxU5Wko.exe, 00000000.00000003.247230845.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246594659.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247048926.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247202053.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246548104.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246957227.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246881598.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247102368.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246931816.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.247027959.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246804982.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.come.com3yIxxU5Wko.exe, 00000000.00000003.260510699.0000000006106000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.coml3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/cabarga.htmlN3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.founder.com.cn/cn3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.244936759.00000000060F2000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.245120597.00000000060F2000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/frere-jones.html3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/Y003yIxxU5Wko.exe, 00000000.00000003.246594659.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246548104.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246804982.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/3yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246594659.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246548104.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246297960.000000000610B000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.246804982.000000000610B000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers83yIxxU5Wko.exe, 00000000.00000002.280901191.0000000007302000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.tiro.coml3yIxxU5Wko.exe, 00000000.00000003.245029033.000000000612F000.00000004.00000020.00020000.00000000.sdmp, 3yIxxU5Wko.exe, 00000000.00000003.245212729.000000000612E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          45.12.253.26
                          tzitziklishop.ddns.netGermany
                          33657CMCSUStrue
                          Joe Sandbox Version:36.0.0 Rainbow Opal
                          Analysis ID:796775
                          Start date and time:2023-02-02 08:00:16 +01:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 10m 29s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:24
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample file name:3yIxxU5Wko.exe
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@25/11@6/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 92%
                          • Number of executed functions: 63
                          • Number of non-executed functions: 6
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, svchost.exe
                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          TimeTypeDescription
                          08:01:14API Interceptor857x Sleep call for process: 3yIxxU5Wko.exe modified
                          08:01:22Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\3yIxxU5Wko.exe" s>$(Arg0)
                          08:01:22Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                          08:01:24AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          08:01:31API Interceptor2x Sleep call for process: dhcpmon.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          45.12.253.26kcnXZ6yXoo.exeGet hashmaliciousBrowse
                            nzCzLT1rR6.exeGet hashmaliciousBrowse
                              wvkLXKZ8u4.exeGet hashmaliciousBrowse
                                tM2hiDXHII.exeGet hashmaliciousBrowse
                                  ugg75Xp5Ly.exeGet hashmaliciousBrowse
                                    jkbRdmvpYk.exeGet hashmaliciousBrowse
                                      97J0yOg7xE.exeGet hashmaliciousBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        tzitziklishop.ddns.netkcnXZ6yXoo.exeGet hashmaliciousBrowse
                                        • 45.12.253.26
                                        nzCzLT1rR6.exeGet hashmaliciousBrowse
                                        • 45.12.253.26
                                        wvkLXKZ8u4.exeGet hashmaliciousBrowse
                                        • 45.12.253.26
                                        tM2hiDXHII.exeGet hashmaliciousBrowse
                                        • 45.12.253.26
                                        ugg75Xp5Ly.exeGet hashmaliciousBrowse
                                        • 45.12.253.26
                                        jkbRdmvpYk.exeGet hashmaliciousBrowse
                                        • 45.12.253.26
                                        97J0yOg7xE.exeGet hashmaliciousBrowse
                                        • 45.12.253.26
                                        9xfmAn7tia.exeGet hashmaliciousBrowse
                                        • 194.180.48.197
                                        AZTEEjjb81.exeGet hashmaliciousBrowse
                                        • 194.180.48.197
                                        dsTz6BOMBc.exeGet hashmaliciousBrowse
                                        • 194.180.48.197
                                        l1yIVNqWbL.exeGet hashmaliciousBrowse
                                        • 194.180.48.197
                                        PAPp2Htw2l.exeGet hashmaliciousBrowse
                                        • 194.180.48.197
                                        fn84Sa6oxP.exeGet hashmaliciousBrowse
                                        • 194.180.48.197
                                        1rCwiABNIs.exeGet hashmaliciousBrowse
                                        • 194.180.48.197
                                        2XFxeuktGo.exeGet hashmaliciousBrowse
                                        • 194.180.48.197
                                        2OBeC7PLQA.exeGet hashmaliciousBrowse
                                        • 194.180.48.197
                                        5HypDdgylj.exeGet hashmaliciousBrowse
                                        • 194.180.48.197
                                        file.exeGet hashmaliciousBrowse
                                        • 194.180.48.197
                                        T1M66eTV7y.exeGet hashmaliciousBrowse
                                        • 194.180.48.197
                                        S55Ni1gsyy.exeGet hashmaliciousBrowse
                                        • 41.216.183.170
                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        CMCSUSfile.exeGet hashmaliciousBrowse
                                        • 45.12.253.56
                                        file.exeGet hashmaliciousBrowse
                                        • 45.12.253.56
                                        file.exeGet hashmaliciousBrowse
                                        • 45.12.253.56
                                        file.exeGet hashmaliciousBrowse
                                        • 45.12.253.56
                                        file.exeGet hashmaliciousBrowse
                                        • 45.12.253.56
                                        file.exeGet hashmaliciousBrowse
                                        • 45.12.253.56
                                        file.exeGet hashmaliciousBrowse
                                        • 45.12.253.56
                                        file.exeGet hashmaliciousBrowse
                                        • 45.12.253.56
                                        file.exeGet hashmaliciousBrowse
                                        • 45.12.253.56
                                        file.exeGet hashmaliciousBrowse
                                        • 45.12.253.56
                                        file.exeGet hashmaliciousBrowse
                                        • 45.12.253.56
                                        file.exeGet hashmaliciousBrowse
                                        • 45.12.253.56
                                        file.exeGet hashmaliciousBrowse
                                        • 45.12.253.56
                                        DRAFT+DOCS+INVCK2023M1903+BL+PL.xlsGet hashmaliciousBrowse
                                        • 171.22.30.147
                                        file.exeGet hashmaliciousBrowse
                                        • 45.12.253.56
                                        file.exeGet hashmaliciousBrowse
                                        • 45.12.253.56
                                        file.exeGet hashmaliciousBrowse
                                        • 45.12.253.56
                                        file.exeGet hashmaliciousBrowse
                                        • 45.12.253.56
                                        file.exeGet hashmaliciousBrowse
                                        • 45.12.253.56
                                        file.exeGet hashmaliciousBrowse
                                        • 45.12.253.56
                                        No context
                                        No context
                                        Process:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):934400
                                        Entropy (8bit):7.675280590834261
                                        Encrypted:false
                                        SSDEEP:24576:IsC41FjAqn8/ysidgzWrSrLYo6F0xMpqG4yPa:JXjAANsSgzWrSvMWiq
                                        MD5:6DF2C2CAACCC7947F8439F248CDD386F
                                        SHA1:419AB96D1452301F126F63AB7E3135C9201E3F61
                                        SHA-256:8ECC4898D03BF034A6586FF886D9883B2AC27D08BDFE70DBD9878A4D77D5DCE8
                                        SHA-512:2E9128E897D4D0E4FA4D2CD4055B360751EA608FD39BCBF309E9EE629E71AB3BDD9ED44A773B69BB47C0F653D8A735054C3022261C73FFB8F5D164CBADB4018D
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 28%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....(.c..............0..:..........nX... ...`....@.. ....................................@..................................X..W....`............................................................................... ............... ..H............text...t8... ...:.................. ..`.rsrc........`.......<..............@..@.reloc...............@..............@..B................PX......H.......p...........X...p................................................0..........*....0...........{#...*..0...........{$...*..0...........(%.....}#.....}$...*....0...........u........z ...9 .2.[a%..^E....;...............+9.,N. . ..Z ..h.a+.(&....{#....{#...o'...,'. .6.Z S..?a+.((....{$....{$...o)...+..+..*..0..4....... .... )UU.Z(&....{#...o*...X )UU.Z((....{$...o+...X*.0..b........r...p......%..{#......%q.........-.&.+.......o,....%..{$......%q.........-.&.+.......o,....
                                        Process:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):26
                                        Entropy (8bit):3.95006375643621
                                        Encrypted:false
                                        SSDEEP:3:ggPYV:rPYV
                                        MD5:187F488E27DB4AF347237FE461A079AD
                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                        Malicious:true
                                        Preview:[ZoneTransfer]....ZoneId=0
                                        Process:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.355304211458859
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                        MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                        SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                        SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                        SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                        Malicious:true
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                        Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.355304211458859
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                        MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                        SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                        SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                        SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                        Malicious:false
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                        Process:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1303
                                        Entropy (8bit):5.106282763013836
                                        Encrypted:false
                                        SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0VAxtn:cbk4oL600QydbQxIYODOLedq3Tj
                                        MD5:528BB8755DED259833140220F4ED719D
                                        SHA1:72EC7DE60FE49DCB0AF6A2D6BE46C861BA281512
                                        SHA-256:0AE5DBA961881DA5E12EF7CD8AE69A5A8DE80EF1873648C35C113F00C0F4F66A
                                        SHA-512:4DEF2C8E6176BE8718A0EB6641D8962D28CCC51A3BF7DBDBD8A114F38C926E3E2774BCA89995FC9415B5C6BA5D51159BB8A0E9C9FA97C942DAE4CCB528642D00
                                        Malicious:true
                                        Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                        Process:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1310
                                        Entropy (8bit):5.109425792877704
                                        Encrypted:false
                                        SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                        MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                        SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                        SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                        SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                        Process:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):232
                                        Entropy (8bit):7.024371743172393
                                        Encrypted:false
                                        SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                                        MD5:32D0AAE13696FF7F8AF33B2D22451028
                                        SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                                        SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                                        SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                                        Malicious:false
                                        Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                                        Process:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        File Type:OpenPGP Public Key
                                        Category:dropped
                                        Size (bytes):8
                                        Entropy (8bit):3.0
                                        Encrypted:false
                                        SSDEEP:3:pO:pO
                                        MD5:B084970AD244C8EB4E9C0480CBDF17A8
                                        SHA1:309DAE2188E884B93A6038FEF906F13B6405AA47
                                        SHA-256:D3C827AC551EB4F941C9DC6AA1A2BDB88F9C24C4C272F981C4189ACB817D47FA
                                        SHA-512:15A69698E625A1CE015A595E89D5413359073B4CAD02060A2AD9CD5E52D62B5F3823A72AC428CE4F1803A608A07E30ED7A1902DDB5C5F7683CD1E368EFF04818
                                        Malicious:true
                                        Preview:.f..6..H
                                        Process:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        File Type:data
                                        Category:modified
                                        Size (bytes):24
                                        Entropy (8bit):4.584962500721156
                                        Encrypted:false
                                        SSDEEP:3:9bzY6oRDJoTBn:RzWDqTB
                                        MD5:3FCC766D28BFD974C68B38C27D0D7A9A
                                        SHA1:45ED19A78D9B79E46EDBFC3E3CA58E90423A676B
                                        SHA-256:39A25F1AB5099005A74CF04F3C61C3253CD9BDA73B85228B58B45AAA4E838641
                                        SHA-512:C7D47BDAABEEBB8C9D9B31CC4CE968EAF291771762FA022A2F55F9BA4838E71FDBD3F83792709E47509C5D94629D6D274CC933371DC01560D13016D944012DA5
                                        Malicious:false
                                        Preview:9iH...}Z.4..f.....l.d
                                        Process:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):327432
                                        Entropy (8bit):7.99938831605763
                                        Encrypted:true
                                        SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                                        MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                                        SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                                        SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                                        SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                                        Malicious:false
                                        Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                                        Process:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):40
                                        Entropy (8bit):4.142896608419108
                                        Encrypted:false
                                        SSDEEP:3:oNN2+WWcsuJ:oNN2RWduJ
                                        MD5:B524911B681E2F42B054FD0311DE9476
                                        SHA1:0FF43787FABE00B8332EC9A741350FF439BCCD7F
                                        SHA-256:56E15BE1ECB9F3DBED863C1336410A6DD0007C5B1845621208668A2A15A342D7
                                        SHA-512:CA95C1F25DC5D84100942A4141CA9C4BFF8AAC0E669FBC493F50ED63EDE9571051C9D369FD5DE142CEDC25A7567D672AA8E4D5F4F97E174FC7CEE536A2680BF6
                                        Malicious:false
                                        Preview:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):7.675280590834261
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        File name:3yIxxU5Wko.exe
                                        File size:934400
                                        MD5:6df2c2caaccc7947f8439f248cdd386f
                                        SHA1:419ab96d1452301f126f63ab7e3135c9201e3f61
                                        SHA256:8ecc4898d03bf034a6586ff886d9883b2ac27d08bdfe70dbd9878a4d77d5dce8
                                        SHA512:2e9128e897d4d0e4fa4d2cd4055b360751ea608fd39bcbf309e9ee629e71ab3bdd9ed44a773b69bb47c0f653d8a735054c3022261c73ffb8f5d164cbadb4018d
                                        SSDEEP:24576:IsC41FjAqn8/ysidgzWrSrLYo6F0xMpqG4yPa:JXjAANsSgzWrSvMWiq
                                        TLSH:2A158D8737B1A8BFF68B407544283F886FA07113BF56E25397373A849B098FBB694151
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....(.c..............0..:..........nX... ...`....@.. ....................................@................................
                                        Icon Hash:00828e8e8686b000
                                        Entrypoint:0x4e586e
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x63DB289A [Thu Feb 2 03:06:02 2023 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xe58140x57.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xe60000x3c8.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xe80000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000xe38740xe3a00False0.8137194964991763data7.679578810089011IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rsrc0xe60000x3c80x400False0.388671875data3.0176806594804035IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0xe80000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountry
                                        RT_VERSION0xe60580x36cdata
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                        192.168.2.645.12.253.264971816652816766 02/02/23-08:01:58.369947TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497181665192.168.2.645.12.253.26
                                        45.12.253.26192.168.2.61665497152841753 02/02/23-08:01:51.077424TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)16654971545.12.253.26192.168.2.6
                                        192.168.2.645.12.253.264971316652816766 02/02/23-08:01:29.730882TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497131665192.168.2.645.12.253.26
                                        192.168.2.645.12.253.264971416652816766 02/02/23-08:01:39.744017TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497141665192.168.2.645.12.253.26
                                        192.168.2.645.12.253.264971516652816766 02/02/23-08:01:51.165371TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497151665192.168.2.645.12.253.26
                                        45.12.253.26192.168.2.61665497182810290 02/02/23-08:01:58.690998TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 116654971845.12.253.26192.168.2.6
                                        45.12.253.26192.168.2.61665497182841753 02/02/23-08:01:58.903710TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)16654971845.12.253.26192.168.2.6
                                        TimestampSource PortDest PortSource IPDest IP
                                        Feb 2, 2023 08:01:27.405668974 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:27.432528973 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:27.432635069 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:27.607346058 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:27.694688082 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:27.694792986 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:27.714261055 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:27.786218882 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:27.786303043 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:27.814512014 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:27.870546103 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:27.905664921 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:27.990725994 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.061522961 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.061603069 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.061652899 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.061685085 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.061702013 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.061750889 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.088815928 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.088848114 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.088865995 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.088884115 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.088902950 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.088918924 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.088922024 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.088943005 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.088951111 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.088965893 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.088970900 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.089005947 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.115677118 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.115745068 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.115791082 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.115796089 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.115838051 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.115883112 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.115885973 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.115933895 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.115982056 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.115986109 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.116033077 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.116079092 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.116080046 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.116126060 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.116173029 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.116178989 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.116220951 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.116267920 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.116281986 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.116314888 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.116358042 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.116364956 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.116410971 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.116452932 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.143675089 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.143743038 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.143791914 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.143795013 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.143838882 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.143882036 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.143887043 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.143934965 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.143982887 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.143987894 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.144031048 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144077063 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.144077063 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144124985 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144167900 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.144171000 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144217014 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144258976 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.144263983 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144310951 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144352913 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.144359112 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144432068 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144471884 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.144478083 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144526005 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144558907 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144593954 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.144604921 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144654036 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144655943 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.144702911 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144742012 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.144750118 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144798040 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144839048 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.144845963 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144893885 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144933939 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.144941092 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.144990921 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.145032883 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.145040035 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.145087004 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.145127058 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.145134926 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.145183086 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.145226002 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.171849012 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.171924114 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.171983957 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172000885 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.172044039 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172086000 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.172091007 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172132015 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172168016 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.172171116 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172211885 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172250032 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.172252893 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172291994 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172327995 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.172331095 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172369957 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172406912 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.172409058 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172447920 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172485113 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.172486067 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172525883 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172560930 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.172565937 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172604084 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172640085 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.172643900 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172692060 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172730923 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.172749996 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172808886 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172847033 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.172851086 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172890902 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172930002 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.172931910 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.172971010 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173007011 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.173012972 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173052073 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173091888 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.173093081 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173134089 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173171997 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.173172951 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173213005 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173249960 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.173254013 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173293114 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173333883 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.173346996 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173388004 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173425913 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173425913 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.173465967 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173501015 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.173504114 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173542976 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173578978 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.173582077 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173656940 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173695087 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173716068 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.173737049 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173775911 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173789024 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.173815966 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173855066 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173856020 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.173892975 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173933029 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.173933983 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.173973083 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.174048901 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.200697899 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.200787067 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.200856924 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.200870037 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.200925112 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.200978994 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.200993061 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201062918 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201123953 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.201124907 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201176882 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201224089 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201232910 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.201271057 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201318979 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201327085 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.201364994 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201411963 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201421976 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.201458931 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201504946 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201524973 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.201550007 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201597929 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201601028 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.201644897 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201693058 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201694965 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.201739073 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201783895 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.201786041 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201833010 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201878071 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.201879025 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201926947 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201973915 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.201975107 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.202022076 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202069998 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202085972 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.202116966 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202163935 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202172041 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.202213049 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202259064 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202266932 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.202306032 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202352047 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202357054 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.202399015 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202445984 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202449083 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.202491999 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202539921 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202545881 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.202586889 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202632904 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202636957 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.202678919 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202739000 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202784061 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202786922 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.202831030 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202836990 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.202877998 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202924013 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.202930927 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.202970028 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.203020096 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.203036070 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.203067064 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.203114986 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.203125000 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.203161955 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.203211069 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.229976892 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.230070114 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.230123043 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.230145931 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.230214119 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.230262995 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.230282068 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.230349064 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.230396986 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.230429888 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.230501890 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.230555058 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.230561018 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.230607986 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.230655909 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.230658054 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.230751038 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.230813980 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.230817080 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.230880976 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.230931044 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.230932951 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.230979919 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231023073 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.231029034 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231082916 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231129885 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.231131077 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231178999 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231223106 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.231226921 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231273890 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231319904 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.231322050 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231368065 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231414080 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231421947 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.231461048 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231518030 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.231518030 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231564999 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231611967 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231617928 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.231658936 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231708050 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231709003 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.231755018 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231801033 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231839895 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.231848955 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231894970 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231900930 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.231942892 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.231992960 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.231992960 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.232039928 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.232086897 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.232098103 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.232136011 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.232181072 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.232182026 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.232228041 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.232275009 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.232275009 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.232321024 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.232367992 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.232372999 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.232414007 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.232460976 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.232464075 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.232507944 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.232556105 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.232556105 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.232604980 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.232652903 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.259538889 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.259613991 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.259661913 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.259677887 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.259722948 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.259792089 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.259794950 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.259865046 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.259917021 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.259931087 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.259999990 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260050058 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.260099888 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260162115 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260207891 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.260211945 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260257006 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260303974 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260320902 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.260349035 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260397911 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260406017 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.260442972 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260490894 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260492086 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.260538101 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260580063 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.260584116 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260632038 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260674953 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.260678053 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260725021 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260772943 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260782003 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.260818958 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260867119 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260874033 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.260914087 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260961056 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.260962009 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.261010885 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261055946 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.261058092 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261105061 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261147976 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.261151075 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261195898 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261240005 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.261243105 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261288881 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261337042 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261344910 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.261384010 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261430025 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261447906 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.261476994 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261524916 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261538982 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.261570930 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261615038 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.261617899 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261663914 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261708975 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.261712074 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261759043 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261805058 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261822939 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.261851072 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261898994 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261910915 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.261945963 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.261995077 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262002945 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.262042046 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262089014 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.262089968 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262135983 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262182951 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262182951 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.262228966 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262274981 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.262275934 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262321949 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262366056 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.262367964 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262414932 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262460947 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.262461901 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262509108 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262554884 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262559891 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.262603045 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262649059 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262655973 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.262742996 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262806892 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262861967 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262864113 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.262906075 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262908936 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.262950897 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.262998104 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.263001919 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:28.340960026 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.603590012 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:28.677321911 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:29.730881929 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:29.802248955 CET16654971345.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:31.167670965 CET497131665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:39.064141035 CET497141665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:39.090909004 CET16654971445.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:39.091017008 CET497141665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:39.091717958 CET497141665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:39.176929951 CET16654971445.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:39.199172974 CET16654971445.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:39.199398994 CET497141665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:39.226789951 CET16654971445.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:39.261513948 CET497141665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:39.333280087 CET16654971445.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:39.494636059 CET16654971445.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:39.591927052 CET497141665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:39.618856907 CET16654971445.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:39.744016886 CET497141665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:39.782939911 CET16654971445.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:39.888916016 CET497141665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:39.919217110 CET16654971445.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:40.091973066 CET497141665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:42.555918932 CET497141665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:50.953835964 CET497151665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:50.980792999 CET16654971545.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:50.980906963 CET497151665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:50.981342077 CET497151665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:51.074731112 CET16654971545.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:51.077424049 CET16654971545.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:51.165370941 CET497151665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:51.192616940 CET16654971545.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:51.249186993 CET497151665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:51.304614067 CET497151665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:51.332336903 CET16654971545.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:51.409033060 CET497151665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:51.684634924 CET497151665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:51.770733118 CET16654971545.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:51.919709921 CET16654971545.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:52.046235085 CET497151665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:52.072544098 CET16654971545.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:52.100351095 CET497151665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:52.178738117 CET16654971545.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:52.188374996 CET497151665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:58.265891075 CET497181665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:58.292433977 CET16654971845.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:58.292515993 CET497181665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:58.293137074 CET497181665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:58.369849920 CET16654971845.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:58.369946957 CET497181665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:58.418915987 CET16654971845.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:58.419126987 CET497181665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:58.449522018 CET16654971845.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:58.461906910 CET497181665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:58.537847042 CET16654971845.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:58.690998077 CET16654971845.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:58.691931009 CET497181665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:58.718426943 CET16654971845.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:58.877100945 CET497181665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:58.903709888 CET16654971845.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:59.046726942 CET497181665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:59.073189020 CET16654971845.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:59.074418068 CET497181665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:59.103283882 CET16654971845.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:59.103429079 CET497181665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:59.130713940 CET16654971845.12.253.26192.168.2.6
                                        Feb 2, 2023 08:01:59.249802113 CET497181665192.168.2.645.12.253.26
                                        Feb 2, 2023 08:01:59.594957113 CET497181665192.168.2.645.12.253.26
                                        TimestampSource PortDest PortSource IPDest IP
                                        Feb 2, 2023 08:01:27.352694035 CET4944853192.168.2.68.8.8.8
                                        Feb 2, 2023 08:01:27.374512911 CET53494488.8.8.8192.168.2.6
                                        Feb 2, 2023 08:01:39.035572052 CET5908253192.168.2.68.8.8.8
                                        Feb 2, 2023 08:01:39.055030107 CET53590828.8.8.8192.168.2.6
                                        Feb 2, 2023 08:01:50.927093983 CET5950453192.168.2.68.8.8.8
                                        Feb 2, 2023 08:01:50.948883057 CET53595048.8.8.8192.168.2.6
                                        Feb 2, 2023 08:01:58.230649948 CET6386353192.168.2.68.8.8.8
                                        Feb 2, 2023 08:01:58.250291109 CET53638638.8.8.8192.168.2.6
                                        Feb 2, 2023 08:02:06.182754040 CET6253853192.168.2.68.8.8.8
                                        Feb 2, 2023 08:02:06.200422049 CET53625388.8.8.8192.168.2.6
                                        Feb 2, 2023 08:02:09.400620937 CET5153053192.168.2.68.8.8.8
                                        Feb 2, 2023 08:02:09.422087908 CET53515308.8.8.8192.168.2.6
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Feb 2, 2023 08:01:27.352694035 CET192.168.2.68.8.8.80xd218Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                        Feb 2, 2023 08:01:39.035572052 CET192.168.2.68.8.8.80x739cStandard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                        Feb 2, 2023 08:01:50.927093983 CET192.168.2.68.8.8.80x6fb7Standard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                        Feb 2, 2023 08:01:58.230649948 CET192.168.2.68.8.8.80x11efStandard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                        Feb 2, 2023 08:02:06.182754040 CET192.168.2.68.8.8.80x444fStandard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                        Feb 2, 2023 08:02:09.400620937 CET192.168.2.68.8.8.80xd6fbStandard query (0)tzitziklishop.ddns.netA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Feb 2, 2023 08:01:27.374512911 CET8.8.8.8192.168.2.60xd218No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                        Feb 2, 2023 08:01:39.055030107 CET8.8.8.8192.168.2.60x739cNo error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                        Feb 2, 2023 08:01:50.948883057 CET8.8.8.8192.168.2.60x6fb7No error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                        Feb 2, 2023 08:01:58.250291109 CET8.8.8.8192.168.2.60x11efNo error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                        Feb 2, 2023 08:02:06.200422049 CET8.8.8.8192.168.2.60x444fNo error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false
                                        Feb 2, 2023 08:02:09.422087908 CET8.8.8.8192.168.2.60xd6fbNo error (0)tzitziklishop.ddns.net45.12.253.26A (IP address)IN (0x0001)false

                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:08:01:07
                                        Start date:02/02/2023
                                        Path:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        Imagebase:0xce0000
                                        File size:934400 bytes
                                        MD5 hash:6DF2C2CAACCC7947F8439F248CDD386F
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.265161826.0000000004019000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.265161826.0000000004019000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.265161826.0000000004019000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.265161826.0000000004019000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.262140358.0000000003160000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.265161826.00000000044B0000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.265161826.00000000044B0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.265161826.00000000044B0000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.265161826.00000000044B0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        Reputation:low

                                        Target ID:1
                                        Start time:08:01:16
                                        Start date:02/02/2023
                                        Path:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        Imagebase:0x3c0000
                                        File size:934400 bytes
                                        MD5 hash:6DF2C2CAACCC7947F8439F248CDD386F
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low

                                        Target ID:2
                                        Start time:08:01:17
                                        Start date:02/02/2023
                                        Path:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        Imagebase:0xad0000
                                        File size:934400 bytes
                                        MD5 hash:6DF2C2CAACCC7947F8439F248CDD386F
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.536518016.0000000007410000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.532206387.00000000055F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.532206387.00000000055F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.532206387.00000000055F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.532206387.00000000055F0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.537510131.0000000007830000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.537510131.0000000007830000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.537510131.0000000007830000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.537510131.0000000007830000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.509135114.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.522256518.0000000004AD1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.509135114.0000000002F3D000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.536448146.0000000007400000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.536448146.0000000007400000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.536448146.0000000007400000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.536448146.0000000007400000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.534992759.0000000006BF0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.534992759.0000000006BF0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.534992759.0000000006BF0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.534992759.0000000006BF0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.536233579.00000000073E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.536233579.00000000073E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.536233579.00000000073E0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.536233579.00000000073E0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.535807006.0000000007390000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.535807006.0000000007390000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.535807006.0000000007390000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.535807006.0000000007390000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                        • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.522256518.00000000049E6000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.537164844.00000000076D0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.537164844.00000000076D0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.537164844.00000000076D0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.537164844.00000000076D0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.536346079.00000000073F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.536346079.00000000073F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.536346079.00000000073F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.536346079.00000000073F0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.536644841.0000000007420000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.536644841.0000000007420000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.536644841.0000000007420000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.536644841.0000000007420000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.536904085.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.536904085.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.536904085.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.536904085.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.533150179.00000000064A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.533150179.00000000064A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.533150179.00000000064A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.533150179.00000000064A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.533150179.00000000064A0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000003.282621709.0000000006851000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.537796470.0000000007860000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.537796470.0000000007860000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.537796470.0000000007860000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.537796470.0000000007860000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.522256518.0000000004970000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.522256518.000000000479F000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        Reputation:low

                                        Target ID:3
                                        Start time:08:01:20
                                        Start date:02/02/2023
                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                        Wow64 process (32bit):true
                                        Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpFB74.tmp
                                        Imagebase:0x8c0000
                                        File size:185856 bytes
                                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        Target ID:4
                                        Start time:08:01:20
                                        Start date:02/02/2023
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6da640000
                                        File size:625664 bytes
                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        Target ID:5
                                        Start time:08:01:20
                                        Start date:02/02/2023
                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                        Wow64 process (32bit):true
                                        Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpFD98.tmp
                                        Imagebase:0x8c0000
                                        File size:185856 bytes
                                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        Target ID:6
                                        Start time:08:01:20
                                        Start date:02/02/2023
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6da640000
                                        File size:625664 bytes
                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        Target ID:7
                                        Start time:08:01:22
                                        Start date:02/02/2023
                                        Path:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\3yIxxU5Wko.exe 0
                                        Imagebase:0x7c0000
                                        File size:934400 bytes
                                        MD5 hash:6DF2C2CAACCC7947F8439F248CDD386F
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Reputation:low

                                        Target ID:8
                                        Start time:08:01:23
                                        Start date:02/02/2023
                                        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                                        Imagebase:0x740000
                                        File size:934400 bytes
                                        MD5 hash:6DF2C2CAACCC7947F8439F248CDD386F
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000008.00000002.317358866.0000000002D60000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Antivirus matches:
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 28%, ReversingLabs
                                        Reputation:low

                                        Target ID:16
                                        Start time:08:01:33
                                        Start date:02/02/2023
                                        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                        Imagebase:0x8d0000
                                        File size:934400 bytes
                                        MD5 hash:6DF2C2CAACCC7947F8439F248CDD386F
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:.Net C# or VB.NET
                                        Reputation:low

                                        Target ID:17
                                        Start time:08:01:34
                                        Start date:02/02/2023
                                        Path:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        Imagebase:0x380000
                                        File size:934400 bytes
                                        MD5 hash:6DF2C2CAACCC7947F8439F248CDD386F
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low

                                        Target ID:18
                                        Start time:08:01:34
                                        Start date:02/02/2023
                                        Path:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\3yIxxU5Wko.exe
                                        Imagebase:0x680000
                                        File size:934400 bytes
                                        MD5 hash:6DF2C2CAACCC7947F8439F248CDD386F
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.344314956.0000000003A89000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.344314956.0000000003A89000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000012.00000002.344314956.0000000003A89000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.336403877.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.336403877.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.336403877.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000012.00000002.336403877.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.341772229.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.341772229.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000012.00000002.341772229.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        Reputation:low

                                        Target ID:19
                                        Start time:08:01:35
                                        Start date:02/02/2023
                                        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        Imagebase:0x1a0000
                                        File size:934400 bytes
                                        MD5 hash:6DF2C2CAACCC7947F8439F248CDD386F
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low

                                        Target ID:20
                                        Start time:08:01:36
                                        Start date:02/02/2023
                                        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        Imagebase:0x630000
                                        File size:934400 bytes
                                        MD5 hash:6DF2C2CAACCC7947F8439F248CDD386F
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.345914663.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.345914663.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000014.00000002.345914663.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        Reputation:low

                                        Target ID:21
                                        Start time:08:01:50
                                        Start date:02/02/2023
                                        Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                        Imagebase:0x8d0000
                                        File size:934400 bytes
                                        MD5 hash:6DF2C2CAACCC7947F8439F248CDD386F
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:.Net C# or VB.NET
                                        Reputation:low

                                        Target ID:23
                                        Start time:08:02:33
                                        Start date:02/02/2023
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6da640000
                                        File size:625664 bytes
                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                        Has elevated privileges:true
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:11.5%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:225
                                          Total number of Limit Nodes:12
                                          execution_graph 19253 2e93fa8 19254 2e93fbf 19253->19254 19259 2e94071 19254->19259 19255 2e93ffd 19256 2e93fd0 19256->19255 19263 2e9377c 19256->19263 19260 2e94092 19259->19260 19261 2e9409d 19260->19261 19267 2e94169 19260->19267 19261->19256 19264 2e93787 19263->19264 19284 2e95434 19264->19284 19266 2e96a6c 19266->19256 19268 2e94172 19267->19268 19269 2e94197 19267->19269 19272 2e94259 19268->19272 19276 2e94268 19268->19276 19269->19261 19273 2e94268 19272->19273 19275 2e9436c 19273->19275 19280 2e93f2c 19273->19280 19277 2e9428f 19276->19277 19278 2e93f2c CreateActCtxA 19277->19278 19279 2e9436c 19277->19279 19278->19279 19281 2e956f8 CreateActCtxA 19280->19281 19283 2e957bb 19281->19283 19283->19283 19285 2e9543f 19284->19285 19288 2e95454 19285->19288 19287 2e96b7d 19287->19266 19289 2e9545f 19288->19289 19292 2e95484 19289->19292 19291 2e96c5a 19291->19287 19293 2e9548f 19292->19293 19296 2e954b4 19293->19296 19295 2e96d4a 19295->19291 19298 2e954bf 19296->19298 19297 2e9749c 19297->19295 19298->19297 19301 2e9b780 19298->19301 19306 2e9b770 19298->19306 19302 2e9b7a1 19301->19302 19303 2e9b7c5 19302->19303 19311 2e9b91f 19302->19311 19315 2e9b930 19302->19315 19303->19297 19308 2e9b780 19306->19308 19307 2e9b7c5 19307->19297 19308->19307 19309 2e9b91f 2 API calls 19308->19309 19310 2e9b930 2 API calls 19308->19310 19309->19307 19310->19307 19312 2e9b93d 19311->19312 19314 2e9b977 19312->19314 19319 2e9b1ec 19312->19319 19314->19303 19317 2e9b93d 19315->19317 19316 2e9b977 19316->19303 19317->19316 19318 2e9b1ec 2 API calls 19317->19318 19318->19316 19320 2e9b1f7 19319->19320 19321 2e9c268 19320->19321 19323 2e9b2d4 19320->19323 19324 2e9b2df 19323->19324 19325 2e954b4 2 API calls 19324->19325 19326 2e9c2d7 19325->19326 19329 2e9e094 19326->19329 19330 2e9c310 19329->19330 19331 2e9e0ad 19329->19331 19330->19321 19333 2e9e4e8 LoadLibraryExW GetModuleHandleW 19331->19333 19334 2e9e4d8 LoadLibraryExW GetModuleHandleW 19331->19334 19332 2e9e0e5 19333->19332 19334->19332 19335 2e9ba48 19336 2e9baae 19335->19336 19340 2e9bc08 19336->19340 19343 2e9bbfa 19336->19343 19337 2e9bb5d 19348 2e9b274 19340->19348 19344 2e9bc02 19343->19344 19347 2e9bba6 19343->19347 19345 2e9b274 DuplicateHandle 19344->19345 19346 2e9bc36 19345->19346 19346->19337 19347->19337 19349 2e9bc70 DuplicateHandle 19348->19349 19350 2e9bc36 19349->19350 19350->19337 19361 2e99658 19362 2e99667 19361->19362 19364 2e99750 19361->19364 19365 2e99763 19364->19365 19366 2e9977b 19365->19366 19372 2e999c8 19365->19372 19376 2e999d8 19365->19376 19366->19362 19367 2e99978 GetModuleHandleW 19369 2e999a5 19367->19369 19368 2e99773 19368->19366 19368->19367 19369->19362 19373 2e999d8 19372->19373 19375 2e99a11 19373->19375 19380 2e99198 19373->19380 19375->19368 19377 2e999ec 19376->19377 19378 2e99198 LoadLibraryExW 19377->19378 19379 2e99a11 19377->19379 19378->19379 19379->19368 19381 2e99bb8 LoadLibraryExW 19380->19381 19383 2e99c31 19381->19383 19383->19375 19351 7ac12c8 19352 7ac1453 19351->19352 19353 7ac12ee 19351->19353 19353->19352 19356 7ac1548 PostMessageW 19353->19356 19358 7ac1540 19353->19358 19357 7ac15b4 19356->19357 19357->19353 19359 7ac1548 PostMessageW 19358->19359 19360 7ac15b4 19359->19360 19360->19353 19384 7b0f6e8 19385 7b0f702 19384->19385 19399 7b0f726 19385->19399 19408 7ac0185 19385->19408 19412 7ac0568 19385->19412 19415 7ac0928 19385->19415 19419 7ac016f 19385->19419 19423 7ac03ef 19385->19423 19427 7ac024f 19385->19427 19433 7ac080d 19385->19433 19437 7ac0871 19385->19437 19441 7ac0390 19385->19441 19445 7ac0a96 19385->19445 19453 7ac00d5 19385->19453 19457 7ac01b4 19385->19457 19461 7ac0a74 19385->19461 19465 7ac039b 19385->19465 19471 7ac02fa 19385->19471 19479 7ac029f 19385->19479 19485 7ac0a03 19385->19485 19494 7ac0040 19385->19494 19498 7ac0c67 19385->19498 19505 7ac0006 19385->19505 19509 7ac08c6 19385->19509 19409 7ac00b1 19408->19409 19515 7b07f20 19409->19515 19519 7b07c08 19412->19519 19416 7ac0932 19415->19416 19416->19415 19523 7ac1280 19416->19523 19527 7ac1270 19416->19527 19420 7ac00bd 19419->19420 19420->19419 19422 7b07f20 CreateProcessA 19420->19422 19421 7ac0230 19422->19421 19424 7ac03f9 19423->19424 19426 7b07c08 WriteProcessMemory 19424->19426 19425 7ac0436 19426->19425 19429 7ac025b 19427->19429 19428 7ac00b1 19432 7b07f20 CreateProcessA 19428->19432 19429->19427 19429->19428 19535 7b07980 19429->19535 19430 7ac0230 19432->19430 19434 7ac0813 19433->19434 19435 7ac1280 ResumeThread 19434->19435 19436 7ac1270 ResumeThread 19434->19436 19435->19434 19436->19434 19438 7ac0873 19437->19438 19440 7b07980 SetThreadContext 19438->19440 19439 7ac088e 19440->19439 19442 7ac0c34 19441->19442 19539 7b07b18 19442->19539 19543 7b07d28 19445->19543 19446 7ac024f 19447 7ac0b02 19446->19447 19448 7ac00b1 19446->19448 19452 7b07980 SetThreadContext 19446->19452 19450 7b07f20 CreateProcessA 19448->19450 19449 7ac0230 19450->19449 19452->19446 19454 7ac00bd 19453->19454 19456 7b07f20 CreateProcessA 19454->19456 19455 7ac0230 19456->19455 19458 7ac00b1 19457->19458 19460 7b07f20 CreateProcessA 19458->19460 19459 7ac0230 19460->19459 19462 7ac0928 19461->19462 19462->19461 19463 7ac1280 ResumeThread 19462->19463 19464 7ac1270 ResumeThread 19462->19464 19463->19462 19464->19462 19466 7ac024f 19465->19466 19466->19465 19467 7ac00b1 19466->19467 19469 7b07980 SetThreadContext 19466->19469 19470 7b07f20 CreateProcessA 19467->19470 19468 7ac0230 19469->19466 19470->19468 19476 7b07c08 WriteProcessMemory 19471->19476 19472 7ac04db 19472->19399 19473 7ac024f 19473->19472 19474 7ac00b1 19473->19474 19478 7b07980 SetThreadContext 19473->19478 19477 7b07f20 CreateProcessA 19474->19477 19475 7ac0230 19476->19473 19477->19475 19478->19473 19480 7ac024f 19479->19480 19481 7ac00b1 19480->19481 19483 7b07980 SetThreadContext 19480->19483 19484 7b07f20 CreateProcessA 19481->19484 19482 7ac0230 19483->19480 19484->19482 19486 7ac0415 19485->19486 19488 7ac024f 19485->19488 19492 7b07c08 WriteProcessMemory 19486->19492 19487 7ac0436 19489 7ac00b1 19488->19489 19493 7b07980 SetThreadContext 19488->19493 19491 7b07f20 CreateProcessA 19489->19491 19490 7ac0230 19491->19490 19492->19487 19493->19488 19495 7ac0073 19494->19495 19497 7b07f20 CreateProcessA 19495->19497 19496 7ac0230 19497->19496 19499 7ac0f20 19498->19499 19500 7ac024f 19498->19500 19499->19399 19501 7ac00b1 19500->19501 19504 7b07980 SetThreadContext 19500->19504 19503 7b07f20 CreateProcessA 19501->19503 19502 7ac0230 19503->19502 19504->19500 19506 7ac0073 19505->19506 19508 7b07f20 CreateProcessA 19506->19508 19507 7ac0230 19508->19507 19511 7ac024f 19509->19511 19510 7ac00b1 19513 7b07f20 CreateProcessA 19510->19513 19511->19510 19514 7b07980 SetThreadContext 19511->19514 19512 7ac0230 19513->19512 19514->19511 19516 7b07fa9 CreateProcessA 19515->19516 19518 7b0816b 19516->19518 19520 7b07c50 WriteProcessMemory 19519->19520 19522 7ac059b 19520->19522 19524 7ac1295 19523->19524 19531 7b078a0 19524->19531 19528 7ac1295 19527->19528 19530 7b078a0 ResumeThread 19528->19530 19529 7ac12a8 19529->19416 19530->19529 19532 7b078e0 ResumeThread 19531->19532 19534 7ac12a8 19532->19534 19534->19416 19536 7b079c5 SetThreadContext 19535->19536 19538 7b07a0d 19536->19538 19538->19429 19540 7b07b58 VirtualAllocEx 19539->19540 19542 7ac0c52 19540->19542 19544 7b07d73 ReadProcessMemory 19543->19544 19546 7b07db7 19544->19546 19546->19446

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 0 7b07f20-7b07fb5 2 7b07fb7-7b07fc1 0->2 3 7b07fee-7b0800e 0->3 2->3 4 7b07fc3-7b07fc5 2->4 10 7b08010-7b0801a 3->10 11 7b08047-7b08076 3->11 5 7b07fc7-7b07fd1 4->5 6 7b07fe8-7b07feb 4->6 8 7b07fd3 5->8 9 7b07fd5-7b07fe4 5->9 6->3 8->9 9->9 13 7b07fe6 9->13 10->11 12 7b0801c-7b0801e 10->12 19 7b08078-7b08082 11->19 20 7b080af-7b08169 CreateProcessA 11->20 14 7b08020-7b0802a 12->14 15 7b08041-7b08044 12->15 13->6 17 7b0802c 14->17 18 7b0802e-7b0803d 14->18 15->11 17->18 18->18 21 7b0803f 18->21 19->20 22 7b08084-7b08086 19->22 31 7b08172-7b081f8 20->31 32 7b0816b-7b08171 20->32 21->15 24 7b08088-7b08092 22->24 25 7b080a9-7b080ac 22->25 26 7b08094 24->26 27 7b08096-7b080a5 24->27 25->20 26->27 27->27 29 7b080a7 27->29 29->25 42 7b08208-7b0820c 31->42 43 7b081fa-7b081fe 31->43 32->31 45 7b0821c-7b08220 42->45 46 7b0820e-7b08212 42->46 43->42 44 7b08200 43->44 44->42 47 7b08230-7b08234 45->47 48 7b08222-7b08226 45->48 46->45 49 7b08214 46->49 51 7b08246-7b0824d 47->51 52 7b08236-7b0823c 47->52 48->47 50 7b08228 48->50 49->45 50->47 53 7b08264 51->53 54 7b0824f-7b0825e 51->54 52->51 54->53
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07B08156
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.287540075.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7b00000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: c4c57da4f6abac37d7ce2ccfef8d024b041fec5f4e977a565254732ca2de67b6
                                          • Instruction ID: 4bc323e00dc89c30b44086230baf894694d0da464eb4074b2bd2bea9d7d0b27c
                                          • Opcode Fuzzy Hash: c4c57da4f6abac37d7ce2ccfef8d024b041fec5f4e977a565254732ca2de67b6
                                          • Instruction Fuzzy Hash: 62913CB1D0065ACFEB14CFA8C841BDDBBB2FF48310F1485A9D859A7280DB749A85CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 56 2e99750-2e99765 call 2e99134 59 2e9977b-2e9977f 56->59 60 2e99767 56->60 61 2e99781-2e9978b 59->61 62 2e99793-2e997d4 59->62 112 2e9976d call 2e999c8 60->112 113 2e9976d call 2e999d8 60->113 61->62 67 2e997e1-2e997ef 62->67 68 2e997d6-2e997de 62->68 63 2e99773-2e99775 63->59 64 2e998b0-2e99970 63->64 105 2e99978-2e999a3 GetModuleHandleW 64->105 106 2e99972-2e99975 64->106 70 2e997f1-2e997f6 67->70 71 2e99813-2e99815 67->71 68->67 73 2e997f8-2e997ff call 2e99140 70->73 74 2e99801 70->74 72 2e99818-2e9981f 71->72 76 2e9982c-2e99833 72->76 77 2e99821-2e99829 72->77 75 2e99803-2e99811 73->75 74->75 75->72 80 2e99840-2e99849 call 2e99150 76->80 81 2e99835-2e9983d 76->81 77->76 86 2e9984b-2e99853 80->86 87 2e99856-2e9985b 80->87 81->80 86->87 89 2e99879-2e9987d 87->89 90 2e9985d-2e99864 87->90 110 2e99880 call 2e99ce0 89->110 111 2e99880 call 2e99cb0 89->111 90->89 92 2e99866-2e99876 call 2e99160 call 2e99170 90->92 92->89 93 2e99883-2e99886 96 2e998a9-2e998af 93->96 97 2e99888-2e998a6 93->97 97->96 107 2e999ac-2e999c0 105->107 108 2e999a5-2e999ab 105->108 106->105 108->107 110->93 111->93 112->63 113->63
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 02E99996
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261895864.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2e90000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 1335a2fbb43c74bfa5efc4296c5b114895232014ac698832e710f60956047fc6
                                          • Instruction ID: 1c0c42401a09bcf1d24843c1717a5a6505df52e1423aab663504c9ca902a5740
                                          • Opcode Fuzzy Hash: 1335a2fbb43c74bfa5efc4296c5b114895232014ac698832e710f60956047fc6
                                          • Instruction Fuzzy Hash: FF710170A00B058FDB24DF6AD44479ABBF1BB88304F108A2ED44A97B51DB79E845CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 114 2e956ec-2e957b9 CreateActCtxA 116 2e957bb-2e957c1 114->116 117 2e957c2-2e9581c 114->117 116->117 124 2e9582b-2e9582f 117->124 125 2e9581e-2e95821 117->125 126 2e95831-2e9583d 124->126 127 2e95840 124->127 125->124 126->127 129 2e95841 127->129 129->129
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 02E957A9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261895864.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2e90000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 5bf92a9781b72e2143fc04403176ebb4c60fe767c475e1dae98fdea2c02c9f74
                                          • Instruction ID: b45086cec7efd218a73777ae71555737829f6e93a310a4cc1458231c78479d70
                                          • Opcode Fuzzy Hash: 5bf92a9781b72e2143fc04403176ebb4c60fe767c475e1dae98fdea2c02c9f74
                                          • Instruction Fuzzy Hash: 0B41EFB1C00619CFDB25CFA9C884BDEBBB1BF48304F60806AD408BB250DBB56946CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 130 2e93f2c-2e957b9 CreateActCtxA 133 2e957bb-2e957c1 130->133 134 2e957c2-2e9581c 130->134 133->134 141 2e9582b-2e9582f 134->141 142 2e9581e-2e95821 134->142 143 2e95831-2e9583d 141->143 144 2e95840 141->144 142->141 143->144 146 2e95841 144->146 146->146
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 02E957A9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261895864.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2e90000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 8eba8462deb6b8ed0d31f45cb98de874589327490d0d220f5739c0061d0cb76b
                                          • Instruction ID: 281e3f8ad098fc9c8ca95d6d5c340f7469fe8869ad5f1e29512d5316fded1e02
                                          • Opcode Fuzzy Hash: 8eba8462deb6b8ed0d31f45cb98de874589327490d0d220f5739c0061d0cb76b
                                          • Instruction Fuzzy Hash: A541DFB1C00619CFDB25DFA9C884BDEBBB5BF48304F60806AD409BB251DBB56946CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 147 7b07c08-7b07c56 149 7b07c66-7b07ca5 WriteProcessMemory 147->149 150 7b07c58-7b07c64 147->150 152 7b07ca7-7b07cad 149->152 153 7b07cae-7b07cde 149->153 150->149 152->153
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07B07C98
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.287540075.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7b00000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 818e7dd3a20ca2721ae52a984a38a01c41bfdc28463a8f325782c1d1bf7311d2
                                          • Instruction ID: 36711087a143bd8148cc2652091d65faf3bf42c5d889e7f2b47447814fe7b085
                                          • Opcode Fuzzy Hash: 818e7dd3a20ca2721ae52a984a38a01c41bfdc28463a8f325782c1d1bf7311d2
                                          • Instruction Fuzzy Hash: 6521F9B19002599FDB10CFAAC984BDEBBF5FF48320F508429E519A7340D778A944CBA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 157 2e9b274-2e9bd04 DuplicateHandle 159 2e9bd0d-2e9bd2a 157->159 160 2e9bd06-2e9bd0c 157->160 160->159
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02E9BC36,?,?,?,?,?), ref: 02E9BCF7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261895864.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2e90000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 5fb947f9a2697ca3672311bd85d866b6ada10e8cfcf1b5f5116fe030b70d6172
                                          • Instruction ID: 70c79f4d9420ab114bd8ebfcdb59d5866ae50d3eb8288ab28ced8cdfa1489480
                                          • Opcode Fuzzy Hash: 5fb947f9a2697ca3672311bd85d866b6ada10e8cfcf1b5f5116fe030b70d6172
                                          • Instruction Fuzzy Hash: 2921E5B5900209EFDB10CF9AD584ADEBBF4EB48324F14845AE914B3310D778A944CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 163 7b07980-7b079cb 165 7b079db-7b07a0b SetThreadContext 163->165 166 7b079cd-7b079d9 163->166 168 7b07a14-7b07a44 165->168 169 7b07a0d-7b07a13 165->169 166->165 169->168
                                          APIs
                                          • SetThreadContext.KERNELBASE(?,00000000), ref: 07B079FE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.287540075.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7b00000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: ContextThread
                                          • String ID:
                                          • API String ID: 1591575202-0
                                          • Opcode ID: 9283493d3c0adfe069f20b92e93771de87eb4bdb74d4c0b1aa5fb68324ff9ccf
                                          • Instruction ID: 4f2139f761ec8505d712f69ccca9df5d6bf0f3d14e0ba2fb0d28691c4a3be0fc
                                          • Opcode Fuzzy Hash: 9283493d3c0adfe069f20b92e93771de87eb4bdb74d4c0b1aa5fb68324ff9ccf
                                          • Instruction Fuzzy Hash: 52213AB19002099FDB10CFAAC4847EEFBF4EF48324F14842AD419A7340CB78A945CFA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 173 7b07d28-7b07db5 ReadProcessMemory 176 7b07db7-7b07dbd 173->176 177 7b07dbe-7b07dee 173->177 176->177
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07B07DA8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.287540075.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7b00000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 2cfade60df007ede81dc3966d14b6e1f8a00964f4d8b444f13f909c6794139ad
                                          • Instruction ID: e429ae7116f7c9908394c818edd8737fc0c7eaa7002b1b7b8f1e17160e928b9c
                                          • Opcode Fuzzy Hash: 2cfade60df007ede81dc3966d14b6e1f8a00964f4d8b444f13f909c6794139ad
                                          • Instruction Fuzzy Hash: 3F212AB19002099FCB10CFAAC880AEEFBF5FF48310F50842AE519A7350C7789940CBA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 181 2e99180-2e99bf8 184 2e99bfa-2e99bfd 181->184 185 2e99c00-2e99c2f LoadLibraryExW 181->185 184->185 186 2e99c38-2e99c55 185->186 187 2e99c31-2e99c37 185->187 187->186
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02E99A11,00000800,00000000,00000000), ref: 02E99C22
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261895864.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2e90000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 48ccf96a66e0849210f1a1a5c64d0aafe8913d476cca4f735843a76e4fe3bc67
                                          • Instruction ID: 4c63e2d69a0b65ed97a00bc6f01ab67f0b25ab908d50d13d66e9477d8f207a89
                                          • Opcode Fuzzy Hash: 48ccf96a66e0849210f1a1a5c64d0aafe8913d476cca4f735843a76e4fe3bc67
                                          • Instruction Fuzzy Hash: E62134B28043499FDB10CFAAD844ADEFFF4AB88324F04846ED455A7741C378A945CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 190 2e9bc68-2e9bd04 DuplicateHandle 191 2e9bd0d-2e9bd2a 190->191 192 2e9bd06-2e9bd0c 190->192 192->191
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02E9BC36,?,?,?,?,?), ref: 02E9BCF7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261895864.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2e90000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 542a14f2a5a9155a880d23b7ad3d5d4e776682f6002507eb8d9cb3edd7a8c586
                                          • Instruction ID: b44c4be307fd9d61377b3f84c2324d155a3a7e228dd6476835f31efc9ba66cb5
                                          • Opcode Fuzzy Hash: 542a14f2a5a9155a880d23b7ad3d5d4e776682f6002507eb8d9cb3edd7a8c586
                                          • Instruction Fuzzy Hash: AE21D2B5D002099FDB10CF9AE984ADEBBF4EB08324F14845AE914B3310D378A955CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 195 2e99198-2e99bf8 197 2e99bfa-2e99bfd 195->197 198 2e99c00-2e99c2f LoadLibraryExW 195->198 197->198 199 2e99c38-2e99c55 198->199 200 2e99c31-2e99c37 198->200 200->199
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02E99A11,00000800,00000000,00000000), ref: 02E99C22
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261895864.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2e90000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: a34d6078dd95b1ea36d5f1a144cdecce0077e1be9a6ef19f13469fd49fffeffa
                                          • Instruction ID: 7da104422d52a1b2c572f6fcc3fc74fa11dcb533973426b35ddb2b378f0fd6a0
                                          • Opcode Fuzzy Hash: a34d6078dd95b1ea36d5f1a144cdecce0077e1be9a6ef19f13469fd49fffeffa
                                          • Instruction Fuzzy Hash: EA1103B69002099FDB10CF9AD844ADEFBF4EB48324F10842EE815B7300C378A945CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 203 2e99bb0-2e99bf8 205 2e99bfa-2e99bfd 203->205 206 2e99c00-2e99c2f LoadLibraryExW 203->206 205->206 207 2e99c38-2e99c55 206->207 208 2e99c31-2e99c37 206->208 208->207
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02E99A11,00000800,00000000,00000000), ref: 02E99C22
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261895864.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2e90000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 9d1c770f339e5a54cbb399de13fda7ca8d9ac76297596d0a7ff19e98987fb46a
                                          • Instruction ID: 52bb8410a112426d56e5dad3fff2a6eb7ed4709e77cbac7c8c765cd4068f26af
                                          • Opcode Fuzzy Hash: 9d1c770f339e5a54cbb399de13fda7ca8d9ac76297596d0a7ff19e98987fb46a
                                          • Instruction Fuzzy Hash: AA1114B69002099FDB10CF9AD844ADEFBF4EB88324F14852ED415B7700C379A545CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 211 7b07b18-7b07b93 VirtualAllocEx 214 7b07b95-7b07b9b 211->214 215 7b07b9c-7b07bc1 211->215 214->215
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07B07B86
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.287540075.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7b00000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: f7d9bb2f4c3b9344d4e437485186efb67b0a422ca34b9f246febd82e4f8c5b98
                                          • Instruction ID: 4578b060faf83422c81647583c8679e13c1416d196f73f363d2fdb9c7f72f4b6
                                          • Opcode Fuzzy Hash: f7d9bb2f4c3b9344d4e437485186efb67b0a422ca34b9f246febd82e4f8c5b98
                                          • Instruction Fuzzy Hash: 2111F9729002499FDB10DFAAD844ADEFFF5EF48320F148819E515A7250CB79A944CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 219 2e99c59-2e99c60 220 2e99bf3-2e99bfc 219->220 221 2e99c62-2e99c75 219->221 222 2e99c00-2e99c2f LoadLibraryExW 220->222 226 2e99c7c-2e99c88 221->226 227 2e99c77-2e99c7b 221->227 224 2e99c38-2e99c55 222->224 225 2e99c31-2e99c37 222->225 225->224 231 2e99c8a-2e99c91 226->231 232 2e99c92-2e99ca7 call 2e99150 226->232
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02E99A11,00000800,00000000,00000000), ref: 02E99C22
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261895864.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2e90000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 82d0cf81e12da8829bd95707670376c02e6aa28fc4a0e7de2cbccfeb3fad3cb7
                                          • Instruction ID: 7c5bb04ca521da5bdb406e3047d9312392a338f1098769cb998ed7c7ce8c17fd
                                          • Opcode Fuzzy Hash: 82d0cf81e12da8829bd95707670376c02e6aa28fc4a0e7de2cbccfeb3fad3cb7
                                          • Instruction Fuzzy Hash: D701C072A402099FDF20DB99E8047DEF7F4EB88324F14841AE505B7701C37AA841CBA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 236 7b078a0-7b0790f ResumeThread 239 7b07911-7b07917 236->239 240 7b07918-7b0793d 236->240 239->240
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.287540075.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7b00000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 7274151635c867ba60d125c031d6562986d29246d9c9125b9e0162854d2efc31
                                          • Instruction ID: 3e89b166101598e3042fd0d9728dbbc8df163a88fb29b5eca05f123b90581b20
                                          • Opcode Fuzzy Hash: 7274151635c867ba60d125c031d6562986d29246d9c9125b9e0162854d2efc31
                                          • Instruction Fuzzy Hash: EE1128B19002499FDB10DFAAC4447DEFFF5EB48320F14881AD519A7350CB78A944CBA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 02E99996
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261895864.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2e90000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 28700206e5443c99354928b7ab06c8078e60ef88fcdc9f1466c1b38e200d6a79
                                          • Instruction ID: 22093b0343b0af425fbf93f35f4c7d2318e73238668b57df027c8d96d0c755e3
                                          • Opcode Fuzzy Hash: 28700206e5443c99354928b7ab06c8078e60ef88fcdc9f1466c1b38e200d6a79
                                          • Instruction Fuzzy Hash: BD110FB6C002098FDB20CF9AD444ADEFBF8EB88324F10842AD429B7710C379A545CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • PostMessageW.USER32(?,?,?,?), ref: 07AC15A5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.287441061.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ac0000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: ed4657d926f899a8c511c58e7d8e178589348659183160ce63a07473ea801afb
                                          • Instruction ID: daef871ab8551124aa98171aaab3a46e5b62a775dd26de6fcf0ba9819ce65ac0
                                          • Opcode Fuzzy Hash: ed4657d926f899a8c511c58e7d8e178589348659183160ce63a07473ea801afb
                                          • Instruction Fuzzy Hash: DB11F5B59002499FDB20CF9AD484BDEFBF8EB48320F20841AD555A7700C375A944CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • PostMessageW.USER32(?,?,?,?), ref: 07AC15A5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.287441061.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ac0000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 58ba09e7a4059414c4cdffe4d5ae49ac61d4594203b1b3b48e789b8446e11278
                                          • Instruction ID: 67892827272671c39bb127f0326d5796bc9ea275a470e8f78b3291f5b436df46
                                          • Opcode Fuzzy Hash: 58ba09e7a4059414c4cdffe4d5ae49ac61d4594203b1b3b48e789b8446e11278
                                          • Instruction Fuzzy Hash: C811D3B59002499FDB10CF9AD884BDEFBF8EB48324F10841AD515A7700C379A944CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261677248.000000000167D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0167D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_167d000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e0000df04611bd4a19fc5beb2f6ee9353a136bd5f3ff7f2700fdc183ad788c60
                                          • Instruction ID: fdc405918fb355008487da98103d5488ebb4443f46a37f849ac5f0fdfecf7858
                                          • Opcode Fuzzy Hash: e0000df04611bd4a19fc5beb2f6ee9353a136bd5f3ff7f2700fdc183ad788c60
                                          • Instruction Fuzzy Hash: 9121C171504240DFEB15DF58D9C0B2ABF65FF88328F248A69E9051A346C33AD456CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261750630.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_168d000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a7f01156d7eb4b4635202c4c05fef53ae140093443a41528608b56e30a928bb2
                                          • Instruction ID: 29d8959ab6905d34ac70d5a780b0d4a53c954e6afc2f38fa3a3302f5db0d2f69
                                          • Opcode Fuzzy Hash: a7f01156d7eb4b4635202c4c05fef53ae140093443a41528608b56e30a928bb2
                                          • Instruction Fuzzy Hash: DE21F575504240DFDB15EF58DCC0B16BB65FB88354F24C669D8494B386C73AD847CA71
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261750630.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_168d000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 10dea9d621a44201977c5f459ac00c057bd932f29701a9358453f31924b3799c
                                          • Instruction ID: 996bf6bbb889bc32c82c233e08271518da39f798835a8c3e9cb86c225e5b6675
                                          • Opcode Fuzzy Hash: 10dea9d621a44201977c5f459ac00c057bd932f29701a9358453f31924b3799c
                                          • Instruction Fuzzy Hash: 9F21F871544240DFDB01EF94D9D0B15BB65FB88324F24C769D9495B386C33AD846CB71
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261750630.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_168d000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 01fe1c6a67a7ee3c17587db79b7f33ae59871654c3971fe11be09ed18b8c53f1
                                          • Instruction ID: d3dae874c2eae9b625468813b6c3c10e51acbaa56a1a58e7595a0357589b9074
                                          • Opcode Fuzzy Hash: 01fe1c6a67a7ee3c17587db79b7f33ae59871654c3971fe11be09ed18b8c53f1
                                          • Instruction Fuzzy Hash: 44219D755093808FDB13DF24D990B15BF71EB46214F28C6EAD8498B697C33A984BCB62
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261677248.000000000167D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0167D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_167d000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a6fdf2f2e46041b4beb1b2d5d446c55f9b934a990d45521ee973aae1d425a0a2
                                          • Instruction ID: 88125c5328f2f3d0be679d48f680fc2be45f9a4b23331b134c0f06c2e21abc32
                                          • Opcode Fuzzy Hash: a6fdf2f2e46041b4beb1b2d5d446c55f9b934a990d45521ee973aae1d425a0a2
                                          • Instruction Fuzzy Hash: 9F11B176504280DFDB12CF54D9C4B1ABF71FF84324F24C6A9D8450B616C33AD456CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261750630.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_168d000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 06da1b886ca8c360793351a6bcf74c807ebd0f899c1c902c7fab35a825fded81
                                          • Instruction ID: b90d0d87ba1c94cda3de70c2b0bb476e03a24a8c8fcda8be6f4f1ad7c332ae3f
                                          • Opcode Fuzzy Hash: 06da1b886ca8c360793351a6bcf74c807ebd0f899c1c902c7fab35a825fded81
                                          • Instruction Fuzzy Hash: 3C11EB75904280DFCB02DF58C9D0B15FBB1FB84324F28C6A9D9484B396C33AD40ACB61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261677248.000000000167D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0167D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_167d000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 09b28bf33016eb7e8c76f0fa1151fc798d38e66b44a9289cd5c0b28068355e6c
                                          • Instruction ID: dc476f2603f7e91bb88511f785a2115420318ba0f80058c67a881ebe5fee1b12
                                          • Opcode Fuzzy Hash: 09b28bf33016eb7e8c76f0fa1151fc798d38e66b44a9289cd5c0b28068355e6c
                                          • Instruction Fuzzy Hash: 8A01F7324083C09AE7104E5DCDC4B76FF98EF81334F08895AED045A346D3799845C6B1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261677248.000000000167D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0167D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_167d000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 04143828bad016398a4da8f77e92257e93137edd92e4797232bcb072f0a8a7bf
                                          • Instruction ID: d7ad1a86eadb2db69ebc6dfe4b67bcaf1b636b07d4217d727d3fd87fbbfb1111
                                          • Opcode Fuzzy Hash: 04143828bad016398a4da8f77e92257e93137edd92e4797232bcb072f0a8a7bf
                                          • Instruction Fuzzy Hash: 46F062724043849EE7118E5ADDC4B66FF98EF81734F18C55AED085B386C3799C44CAB1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261895864.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2e90000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 00ec5ccc0964a748bf9a34a784b8e2e54e13bc6bff1a21b3328fdf473d4ee45d
                                          • Instruction ID: ec68668652f0f2f4124ed27a82e31a9953e91daa68495f96150d6a0062b86e64
                                          • Opcode Fuzzy Hash: 00ec5ccc0964a748bf9a34a784b8e2e54e13bc6bff1a21b3328fdf473d4ee45d
                                          • Instruction Fuzzy Hash: 7E12D7F1CD17468AEB12DF66E99818A7B60B746328FD04A08D2613B6D0D7B811EECF44
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261895864.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2e90000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 296470545d3dddb09fe1aaf9281bb44936b82d481507022c1b93d7693496668b
                                          • Instruction ID: 7c688f03f971b3a458067b331d2555b3e1e04f1da13f9de79f5cd19e0fc637ae
                                          • Opcode Fuzzy Hash: 296470545d3dddb09fe1aaf9281bb44936b82d481507022c1b93d7693496668b
                                          • Instruction Fuzzy Hash: 13A18E32E402198FCF05EFA5C8445EEBBB2FF89304B15956BE905BB221EB35A945CF40
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.261895864.0000000002E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2e90000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 38b507033dc9937e09ae1f5617a7287273a5125d535dc2671101a39cfbbd6a1b
                                          • Instruction ID: 5893775e366363ab91b4c51993c5f99703a18796d3c1d7b1db611137cf71d1c8
                                          • Opcode Fuzzy Hash: 38b507033dc9937e09ae1f5617a7287273a5125d535dc2671101a39cfbbd6a1b
                                          • Instruction Fuzzy Hash: B9C12CB1CD17468BDB12DF66E89818A7B61FB46324FD04B19D2613B6D0D7B810EACF84
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.287540075.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7b00000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0d1b3a532da59207dc95f12d4bcb2f5df98f01352b45540809bf12196d762ec5
                                          • Instruction ID: 109cc7aaa57cd2f2cf1ccd1cf45ad0c9a804457d0537623b314f399d91c95801
                                          • Opcode Fuzzy Hash: 0d1b3a532da59207dc95f12d4bcb2f5df98f01352b45540809bf12196d762ec5
                                          • Instruction Fuzzy Hash: B4415EB1D056588BE719CF678D402CAFBF3AFC5200F19C1BAC45CAB265EA3505568F51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.287540075.0000000007B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7b00000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 994d5f30990368ac0728560231c2ef7b2c3ea81f6fb11cffd60d269ee9a0e47a
                                          • Instruction ID: dc957472e6018d65e957ee7bf54a69dff1d67941e408bf23e60e1998c3258a48
                                          • Opcode Fuzzy Hash: 994d5f30990368ac0728560231c2ef7b2c3ea81f6fb11cffd60d269ee9a0e47a
                                          • Instruction Fuzzy Hash: 7C4141B1E016588BEB5CCF6B8C4068EFAF7AFC9300F18C1BA880CAB255EB3145558F55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.287441061.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ac0000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 199056050b2b1302129668d0b029b14a2b30f694d0d8a2260ce9b68f2658e39f
                                          • Instruction ID: 98902b95475912e0d05a9e8f40d09f47f575b42fa6143099c25012b9ec61efb2
                                          • Opcode Fuzzy Hash: 199056050b2b1302129668d0b029b14a2b30f694d0d8a2260ce9b68f2658e39f
                                          • Instruction Fuzzy Hash: 1BC04C779AE009E68510998868850F9B73CE28B166F01305ADA3EA30019620919485C4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Execution Graph

                                          Execution Coverage:11.5%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:131
                                          Total number of Limit Nodes:9
                                          execution_graph 18281 6c01b64 18282 6c032c0 DnsQuery_A 18281->18282 18284 6c033fa 18282->18284 18251 2e792f0 18252 2e792ff 18251->18252 18255 2e793d9 18251->18255 18262 2e793e8 18251->18262 18256 2e793de 18255->18256 18257 2e79413 18256->18257 18269 2e79670 18256->18269 18257->18252 18258 2e79610 GetModuleHandleW 18260 2e7963d 18258->18260 18259 2e7940b 18259->18257 18259->18258 18260->18252 18263 2e793fb 18262->18263 18264 2e79413 18263->18264 18268 2e79670 LoadLibraryExW 18263->18268 18264->18252 18265 2e7940b 18265->18264 18266 2e79610 GetModuleHandleW 18265->18266 18267 2e7963d 18266->18267 18267->18252 18268->18265 18270 2e79684 18269->18270 18272 2e796a9 18270->18272 18273 2e78768 18270->18273 18272->18259 18274 2e79850 LoadLibraryExW 18273->18274 18276 2e798c9 18274->18276 18276->18272 18285 2e7fe40 SetWindowLongW 18286 2e7feac 18285->18286 18287 2e7bd00 DuplicateHandle 18288 2e7bd96 18287->18288 18289 2e7b6d0 GetCurrentProcess 18290 2e7b743 18289->18290 18291 2e7b74a GetCurrentThread 18289->18291 18290->18291 18292 2e7b787 GetCurrentProcess 18291->18292 18293 2e7b780 18291->18293 18294 2e7b7bd 18292->18294 18293->18292 18295 2e7b7e5 GetCurrentThreadId 18294->18295 18296 2e7b816 18295->18296 18238 6c00fc8 18239 6c00fd8 18238->18239 18240 6c01012 18239->18240 18242 6c012d8 18239->18242 18243 6c0132f 18242->18243 18244 6c012e8 18242->18244 18247 6c013b0 18243->18247 18244->18240 18245 6c0133c 18245->18240 18248 6c01403 18247->18248 18249 6c0146f GetCurrentThreadId 18248->18249 18250 6c0143f 18248->18250 18249->18250 18277 2e7fbf8 18278 2e7fc60 CreateWindowExW 18277->18278 18280 2e7fd1c 18278->18280 18297 2e76758 18299 2e76766 18297->18299 18300 2e76344 18297->18300 18301 2e7634f 18300->18301 18304 2e76394 18301->18304 18303 2e7688d 18303->18299 18305 2e7639f 18304->18305 18308 2e763c4 18305->18308 18307 2e76962 18307->18303 18309 2e763cf 18308->18309 18312 2e763f4 18309->18312 18311 2e76a62 18311->18307 18314 2e763ff 18312->18314 18313 2e771bc 18313->18311 18314->18313 18316 2e7b40b 18314->18316 18317 2e7b429 18316->18317 18318 2e7b44d 18317->18318 18320 2e7b5b8 18317->18320 18318->18313 18322 2e7b5c5 18320->18322 18321 2e7b5ff 18321->18318 18322->18321 18324 2e7a0ec 18322->18324 18325 2e7a0f7 18324->18325 18327 2e7c2f8 18325->18327 18328 2e7b904 18325->18328 18329 2e7b90f 18328->18329 18330 2e763f4 6 API calls 18329->18330 18331 2e7c367 18330->18331 18338 2e7c375 18331->18338 18341 2e7c3d5 18331->18341 18347 2e7c3e0 18331->18347 18353 2e7c3d1 18331->18353 18332 2e7c3a0 18332->18327 18359 2e7e0ec 18338->18359 18365 2e7e0d8 18338->18365 18371 2e7e0e4 18338->18371 18377 2e7e0f0 18338->18377 18342 2e7c3da 18341->18342 18344 2e7c437 18342->18344 18346 2e7c4df 18342->18346 18383 2e7b9a0 18342->18383 18345 2e7c4da KiUserCallbackDispatcher 18344->18345 18344->18346 18345->18346 18348 2e7c40e 18347->18348 18349 2e7b9a0 GetFocus 18348->18349 18350 2e7c4df 18348->18350 18351 2e7c437 18348->18351 18349->18351 18351->18350 18352 2e7c4da KiUserCallbackDispatcher 18351->18352 18352->18350 18354 2e7c3d6 18353->18354 18355 2e7b9a0 GetFocus 18354->18355 18356 2e7c437 18354->18356 18358 2e7c4df 18354->18358 18355->18356 18357 2e7c4da KiUserCallbackDispatcher 18356->18357 18356->18358 18357->18358 18360 2e7e0ee 18359->18360 18361 2e7e12d 18360->18361 18387 2e7e434 18360->18387 18390 2e7e438 18360->18390 18393 2e7e428 18360->18393 18361->18332 18366 2e7e0e6 18365->18366 18367 2e7e12d 18366->18367 18368 2e7e434 2 API calls 18366->18368 18369 2e7e428 2 API calls 18366->18369 18370 2e7e438 2 API calls 18366->18370 18367->18332 18368->18367 18369->18367 18370->18367 18372 2e7e0ea 18371->18372 18373 2e7e12d 18372->18373 18374 2e7e434 2 API calls 18372->18374 18375 2e7e428 2 API calls 18372->18375 18376 2e7e438 2 API calls 18372->18376 18373->18332 18374->18373 18375->18373 18376->18373 18378 2e7e12d 18377->18378 18379 2e7e121 18377->18379 18378->18332 18379->18378 18380 2e7e434 2 API calls 18379->18380 18381 2e7e428 2 API calls 18379->18381 18382 2e7e438 2 API calls 18379->18382 18380->18378 18381->18378 18382->18378 18384 2e7b9ab 18383->18384 18385 2e7ba14 GetFocus 18384->18385 18386 2e7c9f5 18384->18386 18385->18386 18386->18344 18388 2e793e8 LoadLibraryExW GetModuleHandleW 18387->18388 18389 2e7e441 18387->18389 18388->18389 18389->18361 18391 2e793e8 LoadLibraryExW GetModuleHandleW 18390->18391 18392 2e7e441 18391->18392 18392->18361 18394 2e7e42e 18393->18394 18395 2e793e8 LoadLibraryExW GetModuleHandleW 18394->18395 18396 2e7e441 18395->18396 18396->18361

                                          Control-flow Graph

                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 02E7B730
                                          • GetCurrentThread.KERNEL32 ref: 02E7B76D
                                          • GetCurrentProcess.KERNEL32 ref: 02E7B7AA
                                          • GetCurrentThreadId.KERNEL32 ref: 02E7B803
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.508486319.0000000002E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2e70000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: a94734a5e70d92ac1a9925cbe8049af079acf57d3f3afaeba7b4f4a58e49c952
                                          • Instruction ID: e26211886e54952a762d509acffa80e583132116bd8f33cf336e211025bb482c
                                          • Opcode Fuzzy Hash: a94734a5e70d92ac1a9925cbe8049af079acf57d3f3afaeba7b4f4a58e49c952
                                          • Instruction Fuzzy Hash: 8F5134B4D002499FDB10CFAAD588BDEBBF5AF48318F20856AE019B7350DB795884CF65
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 02E7B730
                                          • GetCurrentThread.KERNEL32 ref: 02E7B76D
                                          • GetCurrentProcess.KERNEL32 ref: 02E7B7AA
                                          • GetCurrentThreadId.KERNEL32 ref: 02E7B803
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.508486319.0000000002E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2e70000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: abfa6767b07166c83d89749bc2cda6ce4c33852f8e423152c841d9538f18ec19
                                          • Instruction ID: 74d0486099983f7959e54ac221aafaf1f2fdfdc37f65b4e53a5647de8ba7bd78
                                          • Opcode Fuzzy Hash: abfa6767b07166c83d89749bc2cda6ce4c33852f8e423152c841d9538f18ec19
                                          • Instruction Fuzzy Hash: 8B5144B0D002499FDB10CFAAD548BDEBBF5AF48318F20856AE019B7350DB795884CF65
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 02E7B730
                                          • GetCurrentThread.KERNEL32 ref: 02E7B76D
                                          • GetCurrentProcess.KERNEL32 ref: 02E7B7AA
                                          • GetCurrentThreadId.KERNEL32 ref: 02E7B803
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.508486319.0000000002E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2e70000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: d5a4a963964e59c5f2ddfba4666e0eceb0c46bb5b43694b47e12c5bca9342b2f
                                          • Instruction ID: f12de70b1a6fc83aa26dd24989decea2532deaa6a1c3ed3c5cfd175aa430c3b1
                                          • Opcode Fuzzy Hash: d5a4a963964e59c5f2ddfba4666e0eceb0c46bb5b43694b47e12c5bca9342b2f
                                          • Instruction Fuzzy Hash: 295144B0D002498FDB10CFAAD548BDEBBF5AF48318F20856AE019B7350CB795884CF65
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 62 2e793e8-2e793fd call 2e78704 65 2e79413-2e79417 62->65 66 2e793ff-2e7940d call 2e79670 62->66 67 2e7942b-2e7946c 65->67 68 2e79419-2e79423 65->68 66->65 70 2e79548-2e79608 66->70 73 2e7946e-2e79476 67->73 74 2e79479-2e79487 67->74 68->67 110 2e79610-2e7963b GetModuleHandleW 70->110 111 2e7960a-2e7960d 70->111 73->74 76 2e794ab-2e794ad 74->76 77 2e79489-2e7948e 74->77 78 2e794b0-2e794b7 76->78 79 2e79490-2e79497 call 2e78710 77->79 80 2e79499 77->80 82 2e794c4-2e794cb 78->82 83 2e794b9-2e794c1 78->83 81 2e7949b-2e794a9 79->81 80->81 81->78 87 2e794cd-2e794d5 82->87 88 2e794d8-2e794e1 call 2e78720 82->88 83->82 87->88 93 2e794e3-2e794eb 88->93 94 2e794ee-2e794f3 88->94 93->94 95 2e794f5-2e794fc 94->95 96 2e79511-2e79515 94->96 95->96 98 2e794fe-2e7950e call 2e78730 call 2e78740 95->98 116 2e79518 call 2e79968 96->116 117 2e79518 call 2e79958 96->117 98->96 99 2e7951b-2e7951e 103 2e79541-2e79547 99->103 104 2e79520-2e7953e 99->104 104->103 112 2e79644-2e79658 110->112 113 2e7963d-2e79643 110->113 111->110 113->112 116->99 117->99
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 02E7962E
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.508486319.0000000002E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2e70000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: bebb3c498ffc593b0d358c58ad763bbc98d83a454ff281d20c648efe3abc940a
                                          • Instruction ID: 17a15ea1b3b09eb40ea0364db605d17547b454c30b0ca90d4a6331861d8bb7cf
                                          • Opcode Fuzzy Hash: bebb3c498ffc593b0d358c58ad763bbc98d83a454ff281d20c648efe3abc940a
                                          • Instruction Fuzzy Hash: 90711670A00B058FD724DF6AD48475ABBF2BF88318F108A2ED48AD7A50E775E845CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 118 6c01b64-6c03333 121 6c03335-6c0333f 118->121 122 6c0336c-6c033f8 DnsQuery_A 118->122 121->122 123 6c03341-6c03343 121->123 131 6c03401-6c0344e 122->131 132 6c033fa-6c03400 122->132 124 6c03345-6c0334f 123->124 125 6c03366-6c03369 123->125 127 6c03351 124->127 128 6c03353-6c03362 124->128 125->122 127->128 128->128 130 6c03364 128->130 130->125 137 6c03450-6c03454 131->137 138 6c0345e-6c03462 131->138 132->131 137->138 139 6c03456 137->139 140 6c03471-6c03475 138->140 141 6c03464-6c03467 138->141 139->138 142 6c03486 140->142 143 6c03477-6c03483 140->143 141->140 143->142
                                          APIs
                                          • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06C033E8
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.535076566.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BF0000, based on PE: true
                                          • Associated: 00000002.00000002.534992759.0000000006BF0000.00000004.08000000.00040000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_6bf0000_3yIxxU5Wko.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Query_
                                          • String ID:
                                          • API String ID: 428220571-0
                                          • Opcode ID: d7de2c977c2b0ac3eddbb210dee49011f47c51f5ee9239094f8a1c64e7457d00
                                          • Instruction ID: d71b352edc8451bdafe3fb31d7025d3ab35c17a306130e82ec2df8d667423c1d
                                          • Opcode Fuzzy Hash: d7de2c977c2b0ac3eddbb210dee49011f47c51f5ee9239094f8a1c64e7457d00
                                          • Instruction Fuzzy Hash: 15512671D002599FDB50CFA9C8806DDBBB5FF48314F14802AE819BB290DB759986CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 145 2e7fbec-2e7fc5e 146 2e7fc60-2e7fc66 145->146 147 2e7fc69-2e7fc70 145->147 146->147 148 2e7fc72-2e7fc78 147->148 149 2e7fc7b-2e7fcb3 147->149 148->149 150 2e7fcbb-2e7fd1a CreateWindowExW 149->150 151 2e7fd23-2e7fd5b 150->151 152 2e7fd1c-2e7fd22 150->152 156 2e7fd5d-2e7fd60 151->156 157 2e7fd68 151->157 152->151 156->157 158 2e7fd69 157->158 158->158
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02E7FD0A
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.508486319.0000000002E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2e70000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: 627b640bd7dc29653cd37cef0f5bc40671eb0c1789dc5b93cc136bafe810414f
                                          • Instruction ID: 1e4a87494737f1b176135fc3f7a649f322b2415ba5ca03c82ad7461bf0e56a7d
                                          • Opcode Fuzzy Hash: 627b640bd7dc29653cd37cef0f5bc40671eb0c1789dc5b93cc136bafe810414f
                                          • Instruction Fuzzy Hash: 2D51CFB1D00309DFDB14CFA9D884ADEBBB1BF48314F24852AE819AB210D775A985CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 159 2e7fbf8-2e7fc5e 160 2e7fc60-2e7fc66 159->160 161 2e7fc69-2e7fc70 159->161 160->161 162 2e7fc72-2e7fc78 161->162 163 2e7fc7b-2e7fd1a CreateWindowExW 161->163 162->163 165 2e7fd23-2e7fd5b 163->165 166 2e7fd1c-2e7fd22 163->166 170 2e7fd5d-2e7fd60 165->170 171 2e7fd68 165->171 166->165 170->171 172 2e7fd69 171->172 172->172
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02E7FD0A
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.508486319.0000000002E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2e70000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: 18e2cf777bfe8d5360b559bb4c01860b411093ff8fad20bdcb985e5530775fc6
                                          • Instruction ID: 8dbab57c6430f12a5a30634d859463e1c95217a281679c4ff2375d98b3df8099
                                          • Opcode Fuzzy Hash: 18e2cf777bfe8d5360b559bb4c01860b411093ff8fad20bdcb985e5530775fc6
                                          • Instruction Fuzzy Hash: C841B0B1D00309DFDB14CF9AD884ADEBBB5BF48314F24812AE819AB310D7759985CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 173 6c013b0-6c0141c 177 6c01429-6c0143d 173->177 178 6c0141e-6c01427 173->178 183 6c01459-6c01463 177->183 184 6c0143f-6c01457 177->184 181 6c01465-6c01467 178->181 185 6c0146f-6c0149d GetCurrentThreadId 181->185 183->181 188 6c014cd-6c014d1 184->188 186 6c014a6-6c014cb 185->186 187 6c0149f-6c014a5 185->187 186->188 187->186 189 6c014d3 188->189 190 6c014dc 188->190 189->190
                                          APIs
                                          • GetCurrentThreadId.KERNEL32 ref: 06C01489
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.535076566.0000000006C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BF0000, based on PE: true
                                          • Associated: 00000002.00000002.534992759.0000000006BF0000.00000004.08000000.00040000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_6bf0000_3yIxxU5Wko.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CurrentThread
                                          • String ID:
                                          • API String ID: 2882836952-0
                                          • Opcode ID: 8c69c70b0a2aa3843ecfc46de7b692426e782343c8a644e1c1b8396a79ec594d
                                          • Instruction ID: e9328ea37c7434468860135e71f269d8279171d97976bab4ca921e5e8417e2e3
                                          • Opcode Fuzzy Hash: 8c69c70b0a2aa3843ecfc46de7b692426e782343c8a644e1c1b8396a79ec594d
                                          • Instruction Fuzzy Hash: DA315A71E002189FDB64DFAAD484BADFBF5AF48714F18806EE805A77A0CB749845CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 193 2e7bcf9-2e7bcfe 194 2e7bd00-2e7bd94 DuplicateHandle 193->194 195 2e7bd96-2e7bd9c 194->195 196 2e7bd9d-2e7bdba 194->196 195->196
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02E7BD87
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.508486319.0000000002E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2e70000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: f62d861aa394bb6fd7a0205f78b2f16a6e2e074a4b36ae39b049666af31211be
                                          • Instruction ID: 3eed16f19d9502cbde5587286878033022ee788e3c9668083f9af13bd2e9fb0b
                                          • Opcode Fuzzy Hash: f62d861aa394bb6fd7a0205f78b2f16a6e2e074a4b36ae39b049666af31211be
                                          • Instruction Fuzzy Hash: 0621E6B5D00209AFDB10CF9AD984ADEBFF9EB48324F14801AE954B3310D378A944CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 200 2e7bd00-2e7bd94 DuplicateHandle 201 2e7bd96-2e7bd9c 200->201 202 2e7bd9d-2e7bdba 200->202 201->202
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02E7BD87
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.508486319.0000000002E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2e70000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 798841d1efb4d15296c4923a44493037cfdcf8a869889b8fede5a68feb9445ba
                                          • Instruction ID: 673f001d401af35f064a1ec35af9b008f13b929ce7312e69f9606b278e450a48
                                          • Opcode Fuzzy Hash: 798841d1efb4d15296c4923a44493037cfdcf8a869889b8fede5a68feb9445ba
                                          • Instruction Fuzzy Hash: D921C4B5900209AFDB10CF9AD984ADEBFF9EB48324F14841AE954B3310D778A944CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 206 2e78768-2e79890 208 2e79892-2e79895 206->208 209 2e79898-2e798c7 LoadLibraryExW 206->209 208->209 210 2e798d0-2e798ed 209->210 211 2e798c9-2e798cf 209->211 211->210
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02E796A9,00000800,00000000,00000000), ref: 02E798BA
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.508486319.0000000002E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2e70000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: b9bed16024ac3f76faf4a56f01ce5c557c0d77598c661d0d51de581b73585364
                                          • Instruction ID: 3b5e54dc22f7414f70e542cbb72b8112497c41d9637460cdf00f38d0a7e41348
                                          • Opcode Fuzzy Hash: b9bed16024ac3f76faf4a56f01ce5c557c0d77598c661d0d51de581b73585364
                                          • Instruction Fuzzy Hash: AA11C2B69002099FDB10CF9AD444ADEBBF4EB48324F14842AE419B7701C779A945CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 214 2e79849-2e79890 217 2e79892-2e79895 214->217 218 2e79898-2e798c7 LoadLibraryExW 214->218 217->218 219 2e798d0-2e798ed 218->219 220 2e798c9-2e798cf 218->220 220->219
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02E796A9,00000800,00000000,00000000), ref: 02E798BA
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.508486319.0000000002E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2e70000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 99dbea9cad6ae5ad92cd955f478f2f4528643cd6d7f7f6fd8c97656075ff5c22
                                          • Instruction ID: a61285edb72c2c7939e76a474f26473ba1b3823a8158fa876d8eeb2459bbb200
                                          • Opcode Fuzzy Hash: 99dbea9cad6ae5ad92cd955f478f2f4528643cd6d7f7f6fd8c97656075ff5c22
                                          • Instruction Fuzzy Hash: 6A1100B6D002099FDB10CF9AC844ADEFBF5AF48324F14842AE419B7700C779A545CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 223 2e7984c-2e79890 226 2e79892-2e79895 223->226 227 2e79898-2e798c7 LoadLibraryExW 223->227 226->227 228 2e798d0-2e798ed 227->228 229 2e798c9-2e798cf 227->229 229->228
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02E796A9,00000800,00000000,00000000), ref: 02E798BA
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.508486319.0000000002E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2e70000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 3a8cff80c0bbd1ac00a9a4a77e71fbc706f14bd8bd569b6e8b250e6311ef1b1d
                                          • Instruction ID: c15a8134c51d06dd4fec913a6362969923802d0dae4c90a77c3146d9ca7a22ed
                                          • Opcode Fuzzy Hash: 3a8cff80c0bbd1ac00a9a4a77e71fbc706f14bd8bd569b6e8b250e6311ef1b1d
                                          • Instruction Fuzzy Hash: 1411D0B6D002099FDB10CF9AD444ADEFBF5AB48324F14842AE419B7700C779A945CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 232 2e795c8-2e79608 233 2e79610-2e7963b GetModuleHandleW 232->233 234 2e7960a-2e7960d 232->234 235 2e79644-2e79658 233->235 236 2e7963d-2e79643 233->236 234->233 236->235
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 02E7962E
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.508486319.0000000002E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2e70000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: f91734c4724c40db37e01f8a7a23579cefdd54ac7c26c917e8e643c63d342c9b
                                          • Instruction ID: c7be1ed1e610f5bb1990d1c70b6c0d70ce1fda9a71765be615d575b3bb9f90ea
                                          • Opcode Fuzzy Hash: f91734c4724c40db37e01f8a7a23579cefdd54ac7c26c917e8e643c63d342c9b
                                          • Instruction Fuzzy Hash: 8B110FB6C002498FCB20CF9AC444ADEFBF4AF88324F10852AD419A7300C379A546CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 238 2e7fe38-2e7fe3e 240 2e7fe40-2e7feaa SetWindowLongW 238->240 241 2e7feb3-2e7fec7 240->241 242 2e7feac-2e7feb2 240->242 242->241
                                          APIs
                                          • SetWindowLongW.USER32(?,?,?), ref: 02E7FE9D
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.508486319.0000000002E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2e70000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: LongWindow
                                          • String ID:
                                          • API String ID: 1378638983-0
                                          • Opcode ID: 9b012f36aec1833b322e0e04bbdba7a09257eaddac0a250d17c39a15b24dc6b6
                                          • Instruction ID: c850195f1cecad9693c3fdde8127bb14df6f46f0bdbd3ffadec55a7f925fcbcf
                                          • Opcode Fuzzy Hash: 9b012f36aec1833b322e0e04bbdba7a09257eaddac0a250d17c39a15b24dc6b6
                                          • Instruction Fuzzy Hash: 8E1106B58002099FDB10CF9AD584BDEFBF8EB48324F10845AD859B3741D378A945CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetWindowLongW.USER32(?,?,?), ref: 02E7FE9D
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.508486319.0000000002E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2e70000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: LongWindow
                                          • String ID:
                                          • API String ID: 1378638983-0
                                          • Opcode ID: 90714d4f24f6e3fafcac9a39c44a213ab2348a45fc236f22b557cd02f1e72499
                                          • Instruction ID: 59961af9ab305d3b5936943b9a1ae20eb38767224890ecdc6b2d1d2d3332266a
                                          • Opcode Fuzzy Hash: 90714d4f24f6e3fafcac9a39c44a213ab2348a45fc236f22b557cd02f1e72499
                                          • Instruction Fuzzy Hash: 881100B58002099FDB20CF9AD584BDEBBF8EB48324F20845AD818A3700C378A944CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetWindowLongW.USER32(?,?,?), ref: 02E7FE9D
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.508486319.0000000002E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_2e70000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID: LongWindow
                                          • String ID:
                                          • API String ID: 1378638983-0
                                          • Opcode ID: fcff72aabbd8c0ba03e612c3f8dfbde8f188014c6853b14f969aaa979cab5cdf
                                          • Instruction ID: 96eb6993d24d9d7376d5cb3642c159d64861567c0559cdea3d689d1a7e9cd753
                                          • Opcode Fuzzy Hash: fcff72aabbd8c0ba03e612c3f8dfbde8f188014c6853b14f969aaa979cab5cdf
                                          • Instruction Fuzzy Hash: 9711E5B5900249CFDB10CF9AD585BDEBBF8EB48324F10845AD819B7740C379A944CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.535653107.0000000007180000.00000040.00000800.00020000.00000000.sdmp, Offset: 07180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7180000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 484ff7f5641246f344a1898aba8627ccbfa20dab5b241046c2616609525b39e1
                                          • Instruction ID: c0863636643acff6c4f3ba6d11d07338e6010b2226ef8abd119afeb76d06e8f9
                                          • Opcode Fuzzy Hash: 484ff7f5641246f344a1898aba8627ccbfa20dab5b241046c2616609525b39e1
                                          • Instruction Fuzzy Hash: C1E06DB44093908FC70BDF298C400D1BFB0BE8A20033585DBC044CA123D735CA0BDBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.535653107.0000000007180000.00000040.00000800.00020000.00000000.sdmp, Offset: 07180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7180000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 67065e7fac3b29f7807f0a9ba02c3851f166065732eb02998b290d82e2175124
                                          • Instruction ID: f1fe125cf7349c07fa6ebb6bbe8342bbf821fdb964db04271f2acdbf67a06f88
                                          • Opcode Fuzzy Hash: 67065e7fac3b29f7807f0a9ba02c3851f166065732eb02998b290d82e2175124
                                          • Instruction Fuzzy Hash: 5F41E3B0300215AFC705AFADD85056E7BAAFFC9304B04C52AE50ADB794CF74DC0A8BA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.535653107.0000000007180000.00000040.00000800.00020000.00000000.sdmp, Offset: 07180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7180000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fc83adea5cdd58e485becf47affd5d2d9a7f603919cdfda25cfe49b6749d0d03
                                          • Instruction ID: 61007ebdcda379e27c64237dea72fe78e82b789e7dedbd07bf13ed930ae37b7f
                                          • Opcode Fuzzy Hash: fc83adea5cdd58e485becf47affd5d2d9a7f603919cdfda25cfe49b6749d0d03
                                          • Instruction Fuzzy Hash: F631D135300610CFC715EB38E4549597BEAEF89715B1580AAE50ACB7A2CF76DC06CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.535653107.0000000007180000.00000040.00000800.00020000.00000000.sdmp, Offset: 07180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7180000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d2966048fd9cc77413da6945792801707e2826771e7321e94d47f3bf348ab605
                                          • Instruction ID: e31b362cae04c1c3e7e909be81f8b60fedf9d01592c92662a1ed0c2f9b0be242
                                          • Opcode Fuzzy Hash: d2966048fd9cc77413da6945792801707e2826771e7321e94d47f3bf348ab605
                                          • Instruction Fuzzy Hash: 37213372700A159FC369EA7DA81095EB7E7AFC8210718892ED40ECB784DF35EC078B90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.506987749.000000000136D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0136D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_136d000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8ddb204b3d44b774ba8e16259e7697a47a0dab5ff26d219f3cca73740b9ce816
                                          • Instruction ID: 5ba8023339c23b0940f8892d417b0cd7f65d870241407b51819d22631ab99363
                                          • Opcode Fuzzy Hash: 8ddb204b3d44b774ba8e16259e7697a47a0dab5ff26d219f3cca73740b9ce816
                                          • Instruction Fuzzy Hash: 0E213A71604244DFDB12DF58D8C0F26BF69FB88328F24C569E9451B70AC33AD855C7A1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.507074890.000000000137D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_137d000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f1e2ef503d54b149aaa4f893523fa452baf2c6e1f7439a9162ad877fd409f188
                                          • Instruction ID: 8831251beb1d615bad14c6f486360501b9d33073c01b4ee804d36eba87b84d66
                                          • Opcode Fuzzy Hash: f1e2ef503d54b149aaa4f893523fa452baf2c6e1f7439a9162ad877fd409f188
                                          • Instruction Fuzzy Hash: 70212275604244DFDB22DF58D8C0B26BBA5FF88358F24C569E80A4B746C33ED806CA61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.535653107.0000000007180000.00000040.00000800.00020000.00000000.sdmp, Offset: 07180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7180000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fbbaa8445b9749abfd620c4377b2f0e05354ed5a264e69c7efd60cbe3a99d8d2
                                          • Instruction ID: d64146d77810f2d1bfee9f7ceaea87e9fcd55782e80ad5147055a2b4877c9e69
                                          • Opcode Fuzzy Hash: fbbaa8445b9749abfd620c4377b2f0e05354ed5a264e69c7efd60cbe3a99d8d2
                                          • Instruction Fuzzy Hash: 7321C375E006199FCB05DB69D9805DEBBF6BF88200B15C1AAD445DB355EB30DA85CF80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.535653107.0000000007180000.00000040.00000800.00020000.00000000.sdmp, Offset: 07180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7180000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 24114d0fd7203f62be3a371c9496eeba63d38b4b6342fada27305b1e2fab6922
                                          • Instruction ID: 6ceb19e5096cea25b53bb68892770cee2182d07b180b4f64c24a476f9e6445e4
                                          • Opcode Fuzzy Hash: 24114d0fd7203f62be3a371c9496eeba63d38b4b6342fada27305b1e2fab6922
                                          • Instruction Fuzzy Hash: A421D2747052499FC70AEBA8D05497DBBBABF86300B14819AD40B9B3D1CF74DC49CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.506987749.000000000136D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0136D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_136d000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a6fdf2f2e46041b4beb1b2d5d446c55f9b934a990d45521ee973aae1d425a0a2
                                          • Instruction ID: 09f1556612e123f2ea1027a66cc73100417d55ae070b6d6b2223bd55cbc62bc8
                                          • Opcode Fuzzy Hash: a6fdf2f2e46041b4beb1b2d5d446c55f9b934a990d45521ee973aae1d425a0a2
                                          • Instruction Fuzzy Hash: 7811D376904280CFDB12CF58D5C4B56BF71FB84328F24C6A9D9454B61BC33AD456CBA2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.535653107.0000000007180000.00000040.00000800.00020000.00000000.sdmp, Offset: 07180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7180000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 39d9adee9cfb2d0f8e31984a84c297e71d1943acd5433cb02b3305f65f5a9ae0
                                          • Instruction ID: ec30cdb1a4f29d49e95db21da35cf25d69885f43b6182f644de107c17630a987
                                          • Opcode Fuzzy Hash: 39d9adee9cfb2d0f8e31984a84c297e71d1943acd5433cb02b3305f65f5a9ae0
                                          • Instruction Fuzzy Hash: F1118275300215AFDB02DF59DC80A9ABBAAFF89310F04C425E945DB391CB75EC21DB60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.507074890.000000000137D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_137d000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 06da1b886ca8c360793351a6bcf74c807ebd0f899c1c902c7fab35a825fded81
                                          • Instruction ID: af08dfb091ae1dff830cdb38afccf9ae1d2ec1a3a768a03cbe758e7826c97bc0
                                          • Opcode Fuzzy Hash: 06da1b886ca8c360793351a6bcf74c807ebd0f899c1c902c7fab35a825fded81
                                          • Instruction Fuzzy Hash: 15119075504280DFDB22CF54D5C4B15FFA1FF44318F28C6A9D8494B656C33AD45ACB61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.535653107.0000000007180000.00000040.00000800.00020000.00000000.sdmp, Offset: 07180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7180000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4681be61b370506a8d2bcc743b7ca39174ccb72ddbdd8c762e6b767b56c43261
                                          • Instruction ID: 25fc6b29fd9957535420b5afd15201a3184a4171ef0c4f7578cdbd76c3752aac
                                          • Opcode Fuzzy Hash: 4681be61b370506a8d2bcc743b7ca39174ccb72ddbdd8c762e6b767b56c43261
                                          • Instruction Fuzzy Hash: 5F012873B00F128FC336DA788840A9A77E69F89211718867FD44ACB394DB34EC468B90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.535653107.0000000007180000.00000040.00000800.00020000.00000000.sdmp, Offset: 07180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7180000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8f411737629ef5ba4dbc4394ec192410a448df655280fc09b6e310281a66cfbe
                                          • Instruction ID: 419cf8cc513cca21865830fc7b42cb0e6569fa8af9a6d06b391b81a96b3a4b96
                                          • Opcode Fuzzy Hash: 8f411737629ef5ba4dbc4394ec192410a448df655280fc09b6e310281a66cfbe
                                          • Instruction Fuzzy Hash: BAF0B472B00F159FC375EA698800A9B73EA9F88611714863ED44ACB784DF35EC468BD1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.535653107.0000000007180000.00000040.00000800.00020000.00000000.sdmp, Offset: 07180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7180000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a450b52573ebd1fe806b0eb086c4750bb081352fdedb629e19ce8f8df9b6d2f0
                                          • Instruction ID: b4583be33d70130df3312604f0c8643c0efe72f6f684212c09d56ec179439c23
                                          • Opcode Fuzzy Hash: a450b52573ebd1fe806b0eb086c4750bb081352fdedb629e19ce8f8df9b6d2f0
                                          • Instruction Fuzzy Hash: F2F02772604751AFC3169B38D84945A7BE9AF47271309039AE891C77D1DB289C0687A1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.535653107.0000000007180000.00000040.00000800.00020000.00000000.sdmp, Offset: 07180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7180000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a02a9c52eb3c4caf769cf694190a877515409c8d85073fd74d4ed6d6e34fc8f3
                                          • Instruction ID: 5470a5684ef6e2b5eeb63f7471b32521ec4bb0c3005976552556fc87ff28bca9
                                          • Opcode Fuzzy Hash: a02a9c52eb3c4caf769cf694190a877515409c8d85073fd74d4ed6d6e34fc8f3
                                          • Instruction Fuzzy Hash: 86F05571A04B980FD339CB2A8400266FFE20F82518B04C1AEC08E42AA2DEA4A1458B80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.535653107.0000000007180000.00000040.00000800.00020000.00000000.sdmp, Offset: 07180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7180000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 72863c308112c8a3b07b9529c9d8db2b10bd647dd3007992348c062497abfeff
                                          • Instruction ID: 7ed754e60defce83ef59bc99a05d9285d5030c786329613e336b8ae21dc13669
                                          • Opcode Fuzzy Hash: 72863c308112c8a3b07b9529c9d8db2b10bd647dd3007992348c062497abfeff
                                          • Instruction Fuzzy Hash: 81F0E5347092848FD309EF65E595960FF667F41210B0682CCD88A4F7A3C7A0ECD5CB95
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.535653107.0000000007180000.00000040.00000800.00020000.00000000.sdmp, Offset: 07180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7180000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 73d0dbbb9b540796544e97abb52728374c365c3ce033f1da53a13d8b137a2d6b
                                          • Instruction ID: 3b9fa4b6f3a9067fd1ae21f512f46a2993cde8f9078af355106e415a7823725f
                                          • Opcode Fuzzy Hash: 73d0dbbb9b540796544e97abb52728374c365c3ce033f1da53a13d8b137a2d6b
                                          • Instruction Fuzzy Hash: 07E012B0D0121AEFC790EFA8D95179EBBF0BF08210F10856AD415E3742EB7496428FD1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.535653107.0000000007180000.00000040.00000800.00020000.00000000.sdmp, Offset: 07180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7180000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e19326163da3113e16b37a1e92664e4192dbe0456df5687ffc10af50d77eb3bb
                                          • Instruction ID: f0a884dbc18c0c7b776c21d1aa3dc4d196347d11687736e16c28a54c98234107
                                          • Opcode Fuzzy Hash: e19326163da3113e16b37a1e92664e4192dbe0456df5687ffc10af50d77eb3bb
                                          • Instruction Fuzzy Hash: 71E04FB1B00B195BD739DB5B8000217FAE65F85618F04C53EC48F42A51DBA0A4414B84
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.535653107.0000000007180000.00000040.00000800.00020000.00000000.sdmp, Offset: 07180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7180000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 99f39f73a033aeb0d33a07961231f74bb9d73456c783ee9302eab9f70f04f197
                                          • Instruction ID: cde5e226afd5b72edef576d1af6e7c962158adc5e9dd23dcb70db467ed71bfba
                                          • Opcode Fuzzy Hash: 99f39f73a033aeb0d33a07961231f74bb9d73456c783ee9302eab9f70f04f197
                                          • Instruction Fuzzy Hash: 20E012B0D4020EEFC7C0EFA8D41175EBBF0BB08214F10896DC415E7241EB7446018F91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000002.00000002.535653107.0000000007180000.00000040.00000800.00020000.00000000.sdmp, Offset: 07180000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7180000_3yIxxU5Wko.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7da02f9030455f21d39c891f336ef1f3c494ec38caf5ac95366f3982b3946d11
                                          • Instruction ID: a5f99f3a6a5627eb1577e2f0813d361efebf2d4d785359976cf7603add4e8432
                                          • Opcode Fuzzy Hash: 7da02f9030455f21d39c891f336ef1f3c494ec38caf5ac95366f3982b3946d11
                                          • Instruction Fuzzy Hash: 2FB0129390E3C44FC38376640F240D45F209F232003C443C7D184860E3F90C4B08875B
                                          Uniqueness

                                          Uniqueness Score: -1.00%