Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
jw2ILbVCX7.exe

Overview

General Information

Sample Name:jw2ILbVCX7.exe
Original Sample Name:beca1cb2ead4d465a208217ac1b189d1.exe
Analysis ID:876048
MD5:beca1cb2ead4d465a208217ac1b189d1
SHA1:3251edb9b99c9ff7ad8915073c290b4ee68ae6ba
SHA256:ee6820bbca27cf252b5d81cbbf0fe67a85246b4eea3c584607640d0f8adde5e2
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Antivirus / Scanner detection for submitted sample
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Connects to many ports of the same IP (likely port scanning)
Protects its processes via BreakOnTermination flag
Machine Learning detection for sample
.NET source code contains potential unpacker
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • jw2ILbVCX7.exe (PID: 6980 cmdline: C:\Users\user\Desktop\jw2ILbVCX7.exe MD5: BECA1CB2EAD4D465A208217AC1B189D1)
    • schtasks.exe (PID: 7004 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpDC9A.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7068 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 1004 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpDDF3.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • jw2ILbVCX7.exe (PID: 6112 cmdline: C:\Users\user\Desktop\jw2ILbVCX7.exe 0 MD5: BECA1CB2EAD4D465A208217AC1B189D1)
  • dhcpmon.exe (PID: 5748 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: BECA1CB2EAD4D465A208217AC1B189D1)
  • dhcpmon.exe (PID: 7076 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: BECA1CB2EAD4D465A208217AC1B189D1)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "8a269adf-55ef-40ff-8dd6-457050ba", "Group": "dec2nd", "Domain1": "december2n.duckdns.org", "Domain2": "december2nd.ddns.net", "Port": 60451, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Enable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Enable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
jw2ILbVCX7.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0x1018d:$x1: NanoCore.ClientPluginHost
  • 0x101ca:$x2: IClientNetworkHost
  • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
jw2ILbVCX7.exeNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
  • 0xff05:$x1: NanoCore Client.exe
  • 0x1018d:$x2: NanoCore.ClientPluginHost
  • 0x117c6:$s1: PluginCommand
  • 0x117ba:$s2: FileCommand
  • 0x1266b:$s3: PipeExists
  • 0x18422:$s4: PipeCreated
  • 0x101b7:$s5: IClientLoggingHost
jw2ILbVCX7.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    jw2ILbVCX7.exeMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0xfef5:$x1: NanoCore Client
    • 0xff05:$x1: NanoCore Client
    • 0x1014d:$x2: NanoCore.ClientPlugin
    • 0x1018d:$x3: NanoCore.ClientPluginHost
    • 0x10142:$i1: IClientApp
    • 0x10163:$i2: IClientData
    • 0x1016f:$i3: IClientNetwork
    • 0x1017e:$i4: IClientAppHost
    • 0x101a7:$i5: IClientDataHost
    • 0x101b7:$i6: IClientLoggingHost
    • 0x101ca:$i7: IClientNetworkHost
    • 0x101dd:$i8: IClientUIHost
    • 0x101eb:$i9: IClientNameObjectCollection
    • 0x10207:$i10: IClientReadOnlyNameObjectCollection
    • 0xff54:$s1: ClientPlugin
    • 0x10156:$s1: ClientPlugin
    • 0x1064a:$s2: EndPoint
    • 0x10653:$s3: IPAddress
    • 0x1065d:$s4: IPEndPoint
    • 0x12093:$s6: get_ClientSettings
    • 0x12637:$s7: get_Connected
    jw2ILbVCX7.exeNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfef5:$a: NanoCore
    • 0xff05:$a: NanoCore
    • 0x10139:$a: NanoCore
    • 0x1014d:$a: NanoCore
    • 0x1018d:$a: NanoCore
    • 0xff54:$b: ClientPlugin
    • 0x10156:$b: ClientPlugin
    • 0x10196:$b: ClientPlugin
    • 0x1007b:$c: ProjectData
    • 0x10a82:$d: DESCrypto
    • 0x1844e:$e: KeepAlive
    • 0x1643c:$g: LogClientMessage
    • 0x12637:$i: get_Connected
    • 0x10db8:$j: #=q
    • 0x10de8:$j: #=q
    • 0x10e04:$j: #=q
    • 0x10e34:$j: #=q
    • 0x10e50:$j: #=q
    • 0x10e6c:$j: #=q
    • 0x10e9c:$j: #=q
    • 0x10eb8:$j: #=q
    Click to see the 1 entries
    SourceRuleDescriptionAuthorStrings
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
    • 0xff05:$x1: NanoCore Client.exe
    • 0x1018d:$x2: NanoCore.ClientPluginHost
    • 0x117c6:$s1: PluginCommand
    • 0x117ba:$s2: FileCommand
    • 0x1266b:$s3: PipeExists
    • 0x18422:$s4: PipeCreated
    • 0x101b7:$s5: IClientLoggingHost
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
      • 0xfef5:$x1: NanoCore Client
      • 0xff05:$x1: NanoCore Client
      • 0x1014d:$x2: NanoCore.ClientPlugin
      • 0x1018d:$x3: NanoCore.ClientPluginHost
      • 0x10142:$i1: IClientApp
      • 0x10163:$i2: IClientData
      • 0x1016f:$i3: IClientNetwork
      • 0x1017e:$i4: IClientAppHost
      • 0x101a7:$i5: IClientDataHost
      • 0x101b7:$i6: IClientLoggingHost
      • 0x101ca:$i7: IClientNetworkHost
      • 0x101dd:$i8: IClientUIHost
      • 0x101eb:$i9: IClientNameObjectCollection
      • 0x10207:$i10: IClientReadOnlyNameObjectCollection
      • 0xff54:$s1: ClientPlugin
      • 0x10156:$s1: ClientPlugin
      • 0x1064a:$s2: EndPoint
      • 0x10653:$s3: IPAddress
      • 0x1065d:$s4: IPEndPoint
      • 0x12093:$s6: get_ClientSettings
      • 0x12637:$s7: get_Connected
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfef5:$a: NanoCore
      • 0xff05:$a: NanoCore
      • 0x10139:$a: NanoCore
      • 0x1014d:$a: NanoCore
      • 0x1018d:$a: NanoCore
      • 0xff54:$b: ClientPlugin
      • 0x10156:$b: ClientPlugin
      • 0x10196:$b: ClientPlugin
      • 0x1007b:$c: ProjectData
      • 0x10a82:$d: DESCrypto
      • 0x1844e:$e: KeepAlive
      • 0x1643c:$g: LogClientMessage
      • 0x12637:$i: get_Connected
      • 0x10db8:$j: #=q
      • 0x10de8:$j: #=q
      • 0x10e04:$j: #=q
      • 0x10e34:$j: #=q
      • 0x10e50:$j: #=q
      • 0x10e6c:$j: #=q
      • 0x10e9c:$j: #=q
      • 0x10eb8:$j: #=q
      Click to see the 1 entries
      SourceRuleDescriptionAuthorStrings
      00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0x23ba3:$a: NanoCore
        • 0x23bfc:$a: NanoCore
        • 0x23c39:$a: NanoCore
        • 0x23cb2:$a: NanoCore
        • 0x29496:$a: NanoCore
        • 0x294e0:$a: NanoCore
        • 0x296ca:$a: NanoCore
        • 0x23c05:$b: ClientPlugin
        • 0x23c42:$b: ClientPlugin
        • 0x24540:$b: ClientPlugin
        • 0x2454d:$b: ClientPlugin
        • 0x2922f:$b: ClientPlugin
        • 0x2949f:$b: ClientPlugin
        • 0x294e9:$b: ClientPlugin
        • 0x29a01:$c: ProjectData
        • 0x19361:$e: KeepAlive
        • 0x2408d:$g: LogClientMessage
        • 0x298f4:$g: LogClientMessage
        • 0x2400d:$i: get_Connected
        • 0x193fb:$j: #=q
        • 0x1942b:$j: #=q
        00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
        • 0x23c39:$a1: NanoCore.ClientPluginHost
        • 0x29496:$a1: NanoCore.ClientPluginHost
        • 0x23bfc:$a2: NanoCore.ClientPlugin
        • 0x294e0:$a2: NanoCore.ClientPlugin
        • 0x1cb4c:$b1: get_BuilderSettings
        • 0x23fd0:$b1: get_BuilderSettings
        • 0x23c87:$b4: IClientAppHost
        • 0x24041:$b6: AddHostEntry
        • 0x1cabb:$b7: LogClientException
        • 0x240b0:$b7: LogClientException
        • 0x24025:$b8: PipeExists
        • 0x23c74:$b9: IClientLoggingHost
        • 0x294b0:$b9: IClientLoggingHost
        00000000.00000002.645832197.0000000005930000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
        • 0x1646:$x1: NanoCore.ClientPluginHost
        00000000.00000002.645832197.0000000005930000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
        • 0x1646:$x2: NanoCore.ClientPluginHost
        • 0x1724:$s4: PipeCreated
        • 0x1660:$s5: IClientLoggingHost
        Click to see the 32 entries
        SourceRuleDescriptionAuthorStrings
        0.2.jw2ILbVCX7.exe.5944629.6.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
        • 0xb184:$x1: NanoCore.ClientPluginHost
        • 0xb1b1:$x2: IClientNetworkHost
        0.2.jw2ILbVCX7.exe.5944629.6.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
        • 0xb184:$x2: NanoCore.ClientPluginHost
        • 0xc25f:$s4: PipeCreated
        • 0xb19e:$s5: IClientLoggingHost
        0.2.jw2ILbVCX7.exe.5944629.6.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          0.2.jw2ILbVCX7.exe.5944629.6.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
          • 0xb14f:$x2: NanoCore.ClientPlugin
          • 0xb184:$x3: NanoCore.ClientPluginHost
          • 0xb143:$i2: IClientData
          • 0xb165:$i3: IClientNetwork
          • 0xb174:$i5: IClientDataHost
          • 0xb19e:$i6: IClientLoggingHost
          • 0xb1b1:$i7: IClientNetworkHost
          • 0xb1c4:$i8: IClientUIHost
          • 0xb1d2:$i9: IClientNameObjectCollection
          • 0xb1ee:$i10: IClientReadOnlyNameObjectCollection
          • 0xaf41:$s1: ClientPlugin
          • 0xb158:$s1: ClientPlugin
          • 0x10179:$s6: get_ClientSettings
          0.2.jw2ILbVCX7.exe.5944629.6.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
          • 0xb184:$a1: NanoCore.ClientPluginHost
          • 0xb14f:$a2: NanoCore.ClientPlugin
          • 0x100ca:$b1: get_BuilderSettings
          • 0x10039:$b7: LogClientException
          • 0xb19e:$b9: IClientLoggingHost
          Click to see the 86 entries

          AV Detection

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\jw2ILbVCX7.exe, ProcessId: 6980, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          E-Banking Fraud

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\jw2ILbVCX7.exe, ProcessId: 6980, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Persistence and Installation Behavior

          barindex
          Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpDC9A.tmp, CommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpDC9A.tmp, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\jw2ILbVCX7.exe, ParentImage: C:\Users\user\Desktop\jw2ILbVCX7.exe, ParentProcessId: 6980, ParentProcessName: jw2ILbVCX7.exe, ProcessCommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpDC9A.tmp, ProcessId: 7004, ProcessName: schtasks.exe

          Stealing of Sensitive Information

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\jw2ILbVCX7.exe, ProcessId: 6980, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Remote Access Functionality

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\jw2ILbVCX7.exe, ProcessId: 6980, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
          Timestamp:192.168.2.3192.169.69.2649699604512025019 05/26/23-09:30:25.340331
          SID:2025019
          Source Port:49699
          Destination Port:60451
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3192.169.69.2649706604512025019 05/26/23-09:31:04.760372
          SID:2025019
          Source Port:49706
          Destination Port:60451
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3192.169.69.2649713604512025019 05/26/23-09:31:45.263536
          SID:2025019
          Source Port:49713
          Destination Port:60451
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3192.169.69.2649717604512025019 05/26/23-09:32:11.307312
          SID:2025019
          Source Port:49717
          Destination Port:60451
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3192.169.69.2649707604512025019 05/26/23-09:31:09.762081
          SID:2025019
          Source Port:49707
          Destination Port:60451
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3192.169.69.2649718604512025019 05/26/23-09:32:18.263288
          SID:2025019
          Source Port:49718
          Destination Port:60451
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3192.169.69.2649700604512025019 05/26/23-09:30:30.811034
          SID:2025019
          Source Port:49700
          Destination Port:60451
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3192.169.69.2649712604512025019 05/26/23-09:31:39.755174
          SID:2025019
          Source Port:49712
          Destination Port:60451
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3192.169.69.2649701604512025019 05/26/23-09:30:35.827016
          SID:2025019
          Source Port:49701
          Destination Port:60451
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3192.169.69.2649705604512025019 05/26/23-09:30:59.250023
          SID:2025019
          Source Port:49705
          Destination Port:60451
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3192.169.69.2649711604512025019 05/26/23-09:31:34.268145
          SID:2025019
          Source Port:49711
          Destination Port:60451
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.3192.169.69.2649719604512025019 05/26/23-09:32:23.314247
          SID:2025019
          Source Port:49719
          Destination Port:60451
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "8a269adf-55ef-40ff-8dd6-457050ba", "Group": "dec2nd", "Domain1": "december2n.duckdns.org", "Domain2": "december2nd.ddns.net", "Port": 60451, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Enable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Enable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
          Source: jw2ILbVCX7.exeVirustotal: Detection: 85%Perma Link
          Source: jw2ILbVCX7.exeReversingLabs: Detection: 97%
          Source: jw2ILbVCX7.exeAvira: detected
          Source: december2n.duckdns.orgAvira URL Cloud: Label: malware
          Source: december2nd.ddns.netAvira URL Cloud: Label: malware
          Source: december2nd.ddns.netVirustotal: Detection: 16%Perma Link
          Source: december2n.duckdns.orgVirustotal: Detection: 19%Perma Link
          Source: december2nd.ddns.netVirustotal: Detection: 16%Perma Link
          Source: december2n.duckdns.orgVirustotal: Detection: 19%Perma Link
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen7
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 97%
          Source: Yara matchFile source: jw2ILbVCX7.exe, type: SAMPLE
          Source: Yara matchFile source: 0.2.jw2ILbVCX7.exe.5944629.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.jw2ILbVCX7.exe.4093adb.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.jw2ILbVCX7.exe.5940000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.jw2ILbVCX7.exe.4099511.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.jw2ILbVCX7.exe.5940000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.jw2ILbVCX7.exe.4099511.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.jw2ILbVCX7.exe.408ec9e.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000000.368834831.0000000000672000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.387696343.0000000003041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: jw2ILbVCX7.exe PID: 6980, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: jw2ILbVCX7.exe PID: 6112, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5748, type: MEMORYSTR
          Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
          Source: jw2ILbVCX7.exeJoe Sandbox ML: detected
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
          Source: jw2ILbVCX7.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
          Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: jw2ILbVCX7.exe, 00000000.00000002.645832197.0000000005930000.00000004.08000000.00040000.00000000.sdmp, jw2ILbVCX7.exe, 00000000.00000002.637063584.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, jw2ILbVCX7.exe, 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmp, jw2ILbVCX7.exe, 00000005.00000002.387696343.0000000003041000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 4x nop then mov esp, ebp

          Networking

          barindex
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49699 -> 192.169.69.26:60451
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49700 -> 192.169.69.26:60451
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49701 -> 192.169.69.26:60451
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49705 -> 192.169.69.26:60451
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49706 -> 192.169.69.26:60451
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49707 -> 192.169.69.26:60451
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49711 -> 192.169.69.26:60451
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49712 -> 192.169.69.26:60451
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49713 -> 192.169.69.26:60451
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49717 -> 192.169.69.26:60451
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49718 -> 192.169.69.26:60451
          Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49719 -> 192.169.69.26:60451
          Source: global trafficTCP traffic: 212.193.30.230 ports 0,1,4,5,6,60451
          Source: Malware configuration extractorURLs: december2n.duckdns.org
          Source: Malware configuration extractorURLs: december2nd.ddns.net
          Source: unknownDNS query: name: december2n.duckdns.org
          Source: unknownDNS query: name: december2nd.ddns.net
          Source: Joe Sandbox ViewASN Name: SPD-NETTR SPD-NETTR
          Source: Joe Sandbox ViewIP Address: 212.193.30.230 212.193.30.230
          Source: Joe Sandbox ViewIP Address: 212.193.30.230 212.193.30.230
          Source: global trafficTCP traffic: 192.168.2.3:49702 -> 212.193.30.230:60451
          Source: unknownDNS traffic detected: queries for: december2n.duckdns.org
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_04F633B6 WSARecv,
          Source: jw2ILbVCX7.exe, 00000000.00000002.634972579.0000000000DFA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
          Source: jw2ILbVCX7.exe, 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: jw2ILbVCX7.exe, type: SAMPLE
          Source: Yara matchFile source: 0.2.jw2ILbVCX7.exe.5944629.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.jw2ILbVCX7.exe.4093adb.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.jw2ILbVCX7.exe.5940000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.jw2ILbVCX7.exe.4099511.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.jw2ILbVCX7.exe.5940000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.jw2ILbVCX7.exe.4099511.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.jw2ILbVCX7.exe.408ec9e.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000000.368834831.0000000000672000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.387696343.0000000003041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: jw2ILbVCX7.exe PID: 6980, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: jw2ILbVCX7.exe PID: 6112, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5748, type: MEMORYSTR
          Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED

          Operating System Destruction

          barindex
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: 01 00 00 00

          System Summary

          barindex
          Source: jw2ILbVCX7.exe, type: SAMPLEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: jw2ILbVCX7.exe, type: SAMPLEMatched rule: Detects NanoCore Author: ditekSHen
          Source: jw2ILbVCX7.exe, type: SAMPLEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: jw2ILbVCX7.exe, type: SAMPLEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.jw2ILbVCX7.exe.5944629.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 0.2.jw2ILbVCX7.exe.5944629.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.jw2ILbVCX7.exe.5944629.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 6.2.dhcpmon.exe.2853dc4.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 6.2.dhcpmon.exe.2853dc4.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 6.2.dhcpmon.exe.2853dc4.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.jw2ILbVCX7.exe.56a0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 0.2.jw2ILbVCX7.exe.56a0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.jw2ILbVCX7.exe.56a0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.jw2ILbVCX7.exe.5930000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 0.2.jw2ILbVCX7.exe.5930000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.jw2ILbVCX7.exe.5930000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 5.2.jw2ILbVCX7.exe.4093adb.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 5.2.jw2ILbVCX7.exe.4093adb.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 5.2.jw2ILbVCX7.exe.4093adb.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.jw2ILbVCX7.exe.4093adb.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.jw2ILbVCX7.exe.2db17a0.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 0.2.jw2ILbVCX7.exe.2db17a0.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.jw2ILbVCX7.exe.2db17a0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.jw2ILbVCX7.exe.5940000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 0.2.jw2ILbVCX7.exe.5940000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.jw2ILbVCX7.exe.5940000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 6.2.dhcpmon.exe.2858e50.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 6.2.dhcpmon.exe.2858e50.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 6.2.dhcpmon.exe.2858e50.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 5.2.jw2ILbVCX7.exe.408ec9e.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 5.2.jw2ILbVCX7.exe.408ec9e.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 5.2.jw2ILbVCX7.exe.408ec9e.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 5.2.jw2ILbVCX7.exe.3063b90.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 5.2.jw2ILbVCX7.exe.3063b90.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 5.2.jw2ILbVCX7.exe.3063b90.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 5.2.jw2ILbVCX7.exe.4099511.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 5.2.jw2ILbVCX7.exe.4099511.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 5.2.jw2ILbVCX7.exe.4099511.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 5.2.jw2ILbVCX7.exe.3068c1c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 5.2.jw2ILbVCX7.exe.3068c1c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 5.2.jw2ILbVCX7.exe.3068c1c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 5.2.jw2ILbVCX7.exe.3063b90.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 5.2.jw2ILbVCX7.exe.3063b90.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 5.2.jw2ILbVCX7.exe.3063b90.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.jw2ILbVCX7.exe.5940000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 0.2.jw2ILbVCX7.exe.5940000.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.jw2ILbVCX7.exe.5940000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 5.2.jw2ILbVCX7.exe.4099511.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 5.2.jw2ILbVCX7.exe.4099511.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 5.2.jw2ILbVCX7.exe.4099511.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 6.2.dhcpmon.exe.2853dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 6.2.dhcpmon.exe.2853dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 6.2.dhcpmon.exe.2853dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 5.2.jw2ILbVCX7.exe.408ec9e.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 5.2.jw2ILbVCX7.exe.408ec9e.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 5.2.jw2ILbVCX7.exe.408ec9e.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.jw2ILbVCX7.exe.408ec9e.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.jw2ILbVCX7.exe.2db661c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 0.2.jw2ILbVCX7.exe.2db661c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.jw2ILbVCX7.exe.2db661c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.jw2ILbVCX7.exe.2db17a0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 0.2.jw2ILbVCX7.exe.2db17a0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.jw2ILbVCX7.exe.2db17a0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000000.00000002.645832197.0000000005930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 00000000.00000002.645832197.0000000005930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000000.00000002.645832197.0000000005930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000000.00000000.368834831.0000000000672000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 00000000.00000000.368834831.0000000000672000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000000.368834831.0000000000672000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000000.00000002.645656923.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 00000000.00000002.645656923.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000000.00000002.645656923.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000005.00000002.387696343.0000000003041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000002.387696343.0000000003041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000000.00000002.637063584.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: Process Memory Space: jw2ILbVCX7.exe PID: 6980, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: Process Memory Space: jw2ILbVCX7.exe PID: 6980, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: jw2ILbVCX7.exe PID: 6980, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: Process Memory Space: jw2ILbVCX7.exe PID: 6112, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: jw2ILbVCX7.exe PID: 6112, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: Process Memory Space: dhcpmon.exe PID: 5748, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: dhcpmon.exe PID: 5748, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Detects NanoCore Author: ditekSHen
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: jw2ILbVCX7.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: jw2ILbVCX7.exe, type: SAMPLEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: jw2ILbVCX7.exe, type: SAMPLEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: jw2ILbVCX7.exe, type: SAMPLEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: jw2ILbVCX7.exe, type: SAMPLEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: jw2ILbVCX7.exe, type: SAMPLEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.jw2ILbVCX7.exe.5944629.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.jw2ILbVCX7.exe.5944629.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.jw2ILbVCX7.exe.5944629.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.jw2ILbVCX7.exe.5944629.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 6.2.dhcpmon.exe.2853dc4.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 6.2.dhcpmon.exe.2853dc4.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 6.2.dhcpmon.exe.2853dc4.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 6.2.dhcpmon.exe.2853dc4.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.jw2ILbVCX7.exe.56a0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.jw2ILbVCX7.exe.56a0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.jw2ILbVCX7.exe.56a0000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.jw2ILbVCX7.exe.56a0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.jw2ILbVCX7.exe.5930000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.jw2ILbVCX7.exe.5930000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.jw2ILbVCX7.exe.5930000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.jw2ILbVCX7.exe.5930000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 5.2.jw2ILbVCX7.exe.4093adb.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.jw2ILbVCX7.exe.4093adb.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.jw2ILbVCX7.exe.4093adb.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 5.2.jw2ILbVCX7.exe.4093adb.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.jw2ILbVCX7.exe.4093adb.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.jw2ILbVCX7.exe.2db17a0.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.jw2ILbVCX7.exe.2db17a0.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.jw2ILbVCX7.exe.2db17a0.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.jw2ILbVCX7.exe.2db17a0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.jw2ILbVCX7.exe.5940000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.jw2ILbVCX7.exe.5940000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.jw2ILbVCX7.exe.5940000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.jw2ILbVCX7.exe.5940000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 6.2.dhcpmon.exe.2858e50.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 6.2.dhcpmon.exe.2858e50.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 6.2.dhcpmon.exe.2858e50.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 6.2.dhcpmon.exe.2858e50.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 5.2.jw2ILbVCX7.exe.408ec9e.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.jw2ILbVCX7.exe.408ec9e.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.jw2ILbVCX7.exe.408ec9e.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 5.2.jw2ILbVCX7.exe.408ec9e.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 5.2.jw2ILbVCX7.exe.3063b90.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.jw2ILbVCX7.exe.3063b90.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.jw2ILbVCX7.exe.3063b90.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 5.2.jw2ILbVCX7.exe.3063b90.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 5.2.jw2ILbVCX7.exe.4099511.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.jw2ILbVCX7.exe.4099511.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.jw2ILbVCX7.exe.4099511.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 5.2.jw2ILbVCX7.exe.4099511.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 5.2.jw2ILbVCX7.exe.3068c1c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.jw2ILbVCX7.exe.3068c1c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.jw2ILbVCX7.exe.3068c1c.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 5.2.jw2ILbVCX7.exe.3068c1c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 5.2.jw2ILbVCX7.exe.3063b90.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.jw2ILbVCX7.exe.3063b90.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.jw2ILbVCX7.exe.3063b90.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 5.2.jw2ILbVCX7.exe.3063b90.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.jw2ILbVCX7.exe.5940000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.jw2ILbVCX7.exe.5940000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.jw2ILbVCX7.exe.5940000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.jw2ILbVCX7.exe.5940000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 5.2.jw2ILbVCX7.exe.4099511.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.jw2ILbVCX7.exe.4099511.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.jw2ILbVCX7.exe.4099511.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 5.2.jw2ILbVCX7.exe.4099511.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 6.2.dhcpmon.exe.2853dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 6.2.dhcpmon.exe.2853dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 6.2.dhcpmon.exe.2853dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 6.2.dhcpmon.exe.2853dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 5.2.jw2ILbVCX7.exe.408ec9e.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.jw2ILbVCX7.exe.408ec9e.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.jw2ILbVCX7.exe.408ec9e.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 5.2.jw2ILbVCX7.exe.408ec9e.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.jw2ILbVCX7.exe.408ec9e.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.jw2ILbVCX7.exe.2db661c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.jw2ILbVCX7.exe.2db661c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.jw2ILbVCX7.exe.2db661c.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.jw2ILbVCX7.exe.2db661c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.jw2ILbVCX7.exe.2db17a0.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.jw2ILbVCX7.exe.2db17a0.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.jw2ILbVCX7.exe.2db17a0.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.jw2ILbVCX7.exe.2db17a0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000000.00000002.645832197.0000000005930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000000.00000002.645832197.0000000005930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000000.00000002.645832197.0000000005930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000000.00000002.645832197.0000000005930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000000.00000000.368834831.0000000000672000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000000.00000000.368834831.0000000000672000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000000.00000000.368834831.0000000000672000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000000.00000002.645656923.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000000.00000002.645656923.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000000.00000002.645656923.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000000.00000002.645656923.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000005.00000002.387696343.0000000003041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000002.387696343.0000000003041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000000.00000002.637063584.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: Process Memory Space: jw2ILbVCX7.exe PID: 6980, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: Process Memory Space: jw2ILbVCX7.exe PID: 6980, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: jw2ILbVCX7.exe PID: 6980, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: Process Memory Space: jw2ILbVCX7.exe PID: 6112, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: jw2ILbVCX7.exe PID: 6112, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: Process Memory Space: dhcpmon.exe PID: 5748, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: dhcpmon.exe PID: 5748, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_00C590BC
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_00C57ABE
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_00C5943D
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_01143850
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_0114B748
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_011423A0
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_01142FA8
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_01149A78
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_01148E78
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_0114306F
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_01149B3F
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 5_2_05243850
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 5_2_052423A0
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 5_2_05242FA8
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 5_2_0524306F
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_049E2FA8
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_049E23A0
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_049E306F
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 7_2_02FF2FA8
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 7_2_02FF23A0
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 7_2_02FF3850
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 7_2_02FF306F
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_04F61A4A NtSetInformationProcess,
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_04F61D0E NtQuerySystemInformation,
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_04F61CD3 NtQuerySystemInformation,
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_04F61A19 NtSetInformationProcess,
          Source: jw2ILbVCX7.exe, 00000000.00000002.643490065.0000000003E2A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs jw2ILbVCX7.exe
          Source: jw2ILbVCX7.exe, 00000000.00000002.645832197.0000000005930000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoProtectClient.dllT vs jw2ILbVCX7.exe
          Source: jw2ILbVCX7.exe, 00000000.00000002.645979769.0000000005960000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs jw2ILbVCX7.exe
          Source: jw2ILbVCX7.exe, 00000000.00000002.634972579.0000000000DFA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs jw2ILbVCX7.exe
          Source: jw2ILbVCX7.exe, 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs jw2ILbVCX7.exe
          Source: jw2ILbVCX7.exe, 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs jw2ILbVCX7.exe
          Source: jw2ILbVCX7.exe, 00000000.00000002.645656923.00000000056A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs jw2ILbVCX7.exe
          Source: jw2ILbVCX7.exe, 00000000.00000002.637063584.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs jw2ILbVCX7.exe
          Source: jw2ILbVCX7.exe, 00000000.00000002.637063584.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoProtectClient.dllT vs jw2ILbVCX7.exe
          Source: jw2ILbVCX7.exe, 00000005.00000002.386978750.0000000000F3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs jw2ILbVCX7.exe
          Source: jw2ILbVCX7.exe, 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs jw2ILbVCX7.exe
          Source: jw2ILbVCX7.exe, 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoProtectClient.dllT vs jw2ILbVCX7.exe
          Source: jw2ILbVCX7.exe, 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs jw2ILbVCX7.exe
          Source: jw2ILbVCX7.exe, 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs jw2ILbVCX7.exe
          Source: jw2ILbVCX7.exe, 00000005.00000002.387696343.0000000003041000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs jw2ILbVCX7.exe
          Source: jw2ILbVCX7.exe, 00000005.00000002.387696343.0000000003041000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs jw2ILbVCX7.exe
          Source: jw2ILbVCX7.exe, 00000005.00000002.387696343.0000000003041000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoProtectClient.dllT vs jw2ILbVCX7.exe
          Source: jw2ILbVCX7.exeStatic PE information: Section: .rsrc ZLIB complexity 0.9967002467105263
          Source: dhcpmon.exe.0.drStatic PE information: Section: .rsrc ZLIB complexity 0.9967002467105263
          Source: jw2ILbVCX7.exeVirustotal: Detection: 85%
          Source: jw2ILbVCX7.exeReversingLabs: Detection: 97%
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeFile read: C:\Users\user\Desktop\jw2ILbVCX7.exeJump to behavior
          Source: jw2ILbVCX7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\jw2ILbVCX7.exe C:\Users\user\Desktop\jw2ILbVCX7.exe
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpDC9A.tmp
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpDDF3.tmp
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: unknownProcess created: C:\Users\user\Desktop\jw2ILbVCX7.exe C:\Users\user\Desktop\jw2ILbVCX7.exe 0
          Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
          Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpDC9A.tmp
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpDDF3.tmp
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_04F618CE AdjustTokenPrivileges,
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_04F61897 AdjustTokenPrivileges,
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeFile created: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9AJump to behavior
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDC9A.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@10/8@22/2
          Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: jw2ILbVCX7.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: jw2ILbVCX7.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: jw2ILbVCX7.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{8a269adf-55ef-40ff-8dd6-457050baef85}
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7068:120:WilError_01
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2576:120:WilError_01
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
          Source: jw2ILbVCX7.exe, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
          Source: jw2ILbVCX7.exe, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
          Source: jw2ILbVCX7.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: dhcpmon.exe.0.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
          Source: dhcpmon.exe.0.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
          Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
          Source: jw2ILbVCX7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\NanoProtectPlugin\NanoProtectClient\obj\Debug\NanoProtectClient.pdb source: jw2ILbVCX7.exe, 00000000.00000002.645832197.0000000005930000.00000004.08000000.00040000.00000000.sdmp, jw2ILbVCX7.exe, 00000000.00000002.637063584.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, jw2ILbVCX7.exe, 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmp, jw2ILbVCX7.exe, 00000005.00000002.387696343.0000000003041000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: jw2ILbVCX7.exe, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: jw2ILbVCX7.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: dhcpmon.exe.0.dr, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_00C57698 push es; ret
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_00C574AC push ecx; ret
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_00C574B8 push ebp; ret
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_00C59D72 push 7800C5CBh; retf
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_00C59E31 push CDEC0104h; retf
          Source: jw2ILbVCX7.exe, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: jw2ILbVCX7.exe, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: dhcpmon.exe.0.dr, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: dhcpmon.exe.0.dr, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpDC9A.tmp

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeFile opened: C:\Users\user\Desktop\jw2ILbVCX7.exe:Zone.Identifier read attributes | delete
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exe TID: 5728Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exe TID: 5976Thread sleep time: -40000s >= -30000s
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exe TID: 5720Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5272Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5896Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeWindow / User API: foregroundWindowGot 1063
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_04F61AF2 GetSystemInfo,
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: jw2ILbVCX7.exe, 00000000.00000003.534877925.0000000000E7D000.00000004.00000020.00020000.00000000.sdmp, jw2ILbVCX7.exe, 00000000.00000002.634972579.0000000000E84000.00000004.00000020.00020000.00000000.sdmp, jw2ILbVCX7.exe, 00000000.00000003.561973462.0000000000E84000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWn
          Source: jw2ILbVCX7.exe, 00000000.00000003.534877925.0000000000E8D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll~
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeMemory allocated: page read and write | page guard
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpDC9A.tmp
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpDDF3.tmp
          Source: jw2ILbVCX7.exe, 00000000.00000002.634972579.0000000000EAB000.00000004.00000020.00020000.00000000.sdmp, jw2ILbVCX7.exe, 00000000.00000003.534877925.0000000000E8D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager:e879;192.168.2.3
          Source: jw2ILbVCX7.exe, 00000000.00000002.634972579.0000000000E8D000.00000004.00000020.00020000.00000000.sdmp, jw2ILbVCX7.exe, 00000000.00000003.561973462.0000000000E8D000.00000004.00000020.00020000.00000000.sdmp, jw2ILbVCX7.exe, 00000000.00000003.561973462.0000000000EAB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: jw2ILbVCX7.exe, 00000000.00000002.634972579.0000000000E8D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerdecember2nduckdns.org
          Source: jw2ILbVCX7.exe, 00000000.00000002.637063584.0000000002F0E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager0
          Source: jw2ILbVCX7.exe, 00000000.00000003.534877925.0000000000E8D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager0;
          Source: jw2ILbVCX7.exe, 00000000.00000002.634972579.0000000000E8D000.00000004.00000020.00020000.00000000.sdmp, jw2ILbVCX7.exe, 00000000.00000003.561973462.0000000000E8D000.00000004.00000020.00020000.00000000.sdmp, jw2ILbVCX7.exe, 00000000.00000002.634972579.0000000000E9B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerection was forcibly closed by the remote host.
          Source: jw2ILbVCX7.exe, 00000000.00000002.634972579.0000000000E84000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerrg
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: jw2ILbVCX7.exe, type: SAMPLE
          Source: Yara matchFile source: 0.2.jw2ILbVCX7.exe.5944629.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.jw2ILbVCX7.exe.4093adb.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.jw2ILbVCX7.exe.5940000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.jw2ILbVCX7.exe.4099511.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.jw2ILbVCX7.exe.5940000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.jw2ILbVCX7.exe.4099511.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.jw2ILbVCX7.exe.408ec9e.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000000.368834831.0000000000672000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.387696343.0000000003041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: jw2ILbVCX7.exe PID: 6980, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: jw2ILbVCX7.exe PID: 6112, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5748, type: MEMORYSTR
          Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED

          Remote Access Functionality

          barindex
          Source: jw2ILbVCX7.exe, 00000000.00000002.645832197.0000000005930000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: jw2ILbVCX7.exe, 00000000.00000002.645832197.0000000005930000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
          Source: jw2ILbVCX7.exe, 00000000.00000000.368834831.0000000000672000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: jw2ILbVCX7.exe, 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: jw2ILbVCX7.exe, 00000000.00000002.645656923.00000000056A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: jw2ILbVCX7.exe, 00000000.00000002.645656923.00000000056A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: jw2ILbVCX7.exe, 00000000.00000002.637063584.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: jw2ILbVCX7.exe, 00000000.00000002.637063584.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: jw2ILbVCX7.exe, 00000000.00000002.637063584.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
          Source: jw2ILbVCX7.exe, 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: jw2ILbVCX7.exe, 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: jw2ILbVCX7.exe, 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
          Source: jw2ILbVCX7.exe, 00000005.00000002.387696343.0000000003041000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: jw2ILbVCX7.exe, 00000005.00000002.387696343.0000000003041000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: jw2ILbVCX7.exe, 00000005.00000002.387696343.0000000003041000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
          Source: dhcpmon.exe, 00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: dhcpmon.exe, 00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: dhcpmon.exe, 00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoProtectClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoProtectClientClientPluginResourcesNanoProtectClient.My.ResourcesMySettingsMySettingsPropertyFunctionsNanoProtectClient.NanoProtectMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsGetProtectDirectoryGetProtectFileCreateProtectFileKillNanoCoreSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeLogClientMessageSystem.IOFileExistsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedEnvironmentSpecialFolderGetFolderPathPathCombineExceptionDirectoryDirectoryInfoCreateDirectoryFileStreamCreateProjectDataSetProjectErrorClearProjectErrorProcessGetCurrentProcessKillNanoProtectClient.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoProtectClient.dlla[NanoProtect]: Checking for NanoProtect module..
          Source: jw2ILbVCX7.exeString found in binary or memory: NanoCore.ClientPluginHost
          Source: dhcpmon.exe.0.drString found in binary or memory: NanoCore.ClientPluginHost
          Source: Yara matchFile source: jw2ILbVCX7.exe, type: SAMPLE
          Source: Yara matchFile source: 0.2.jw2ILbVCX7.exe.5944629.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.jw2ILbVCX7.exe.4093adb.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.jw2ILbVCX7.exe.5940000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.jw2ILbVCX7.exe.4099511.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.0.jw2ILbVCX7.exe.670000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.jw2ILbVCX7.exe.5940000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.jw2ILbVCX7.exe.4099511.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.jw2ILbVCX7.exe.408ec9e.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000000.368834831.0000000000672000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.387696343.0000000003041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: jw2ILbVCX7.exe PID: 6980, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: jw2ILbVCX7.exe PID: 6112, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5748, type: MEMORYSTR
          Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_04F62EFA bind,
          Source: C:\Users\user\Desktop\jw2ILbVCX7.exeCode function: 0_2_04F62ECA bind,
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Scheduled Task/Job
          1
          Scheduled Task/Job
          1
          Access Token Manipulation
          2
          Masquerading
          21
          Input Capture
          11
          Security Software Discovery
          Remote Services21
          Input Capture
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts12
          Process Injection
          1
          Disable or Modify Tools
          LSASS Memory2
          Process Discovery
          Remote Desktop Protocol11
          Archive Collected Data
          Exfiltration Over Bluetooth1
          Non-Standard Port
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)1
          Scheduled Task/Job
          21
          Virtualization/Sandbox Evasion
          Security Account Manager21
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
          Remote Access Software
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
          Access Token Manipulation
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput CaptureScheduled Transfer1
          Ingress Tool Transfer
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script12
          Process Injection
          LSA Secrets1
          Remote System Discovery
          SSHKeyloggingData Transfer Size Limits1
          Non-Application Layer Protocol
          Manipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials3
          System Information Discovery
          VNCGUI Input CaptureExfiltration Over C2 Channel21
          Application Layer Protocol
          Jamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items1
          Hidden Files and Directories
          DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job2
          Obfuscated Files or Information
          Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)11
          Software Packing
          /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 876048 Sample: jw2ILbVCX7.exe Startdate: 26/05/2023 Architecture: WINDOWS Score: 100 40 Snort IDS alert for network traffic 2->40 42 Multi AV Scanner detection for domain / URL 2->42 44 Found malware configuration 2->44 46 16 other signatures 2->46 7 jw2ILbVCX7.exe 1 14 2->7         started        12 jw2ILbVCX7.exe 3 2->12         started        14 dhcpmon.exe 3 2->14         started        16 dhcpmon.exe 2 2->16         started        process3 dnsIp4 36 december2n.duckdns.org 192.169.69.26, 49699, 49700, 49701 WOWUS United States 7->36 38 december2nd.ddns.net 212.193.30.230, 49702, 49703, 49704 SPD-NETTR Russian Federation 7->38 26 C:\Program Files (x86)\...\dhcpmon.exe, PE32 7->26 dropped 28 C:\Users\user\AppData\Roaming\...\run.dat, data 7->28 dropped 30 C:\Users\user\AppData\Local\...\tmpDC9A.tmp, XML 7->30 dropped 32 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 7->32 dropped 48 Protects its processes via BreakOnTermination flag 7->48 50 Uses schtasks.exe or at.exe to add and modify task schedules 7->50 52 Hides that the sample has been downloaded from the Internet (zone.identifier) 7->52 18 schtasks.exe 1 7->18         started        20 schtasks.exe 1 7->20         started        34 C:\Users\user\AppData\...\jw2ILbVCX7.exe.log, ASCII 12->34 dropped file5 signatures6 process7 process8 22 conhost.exe 18->22         started        24 conhost.exe 20->24         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          jw2ILbVCX7.exe86%VirustotalBrowse
          jw2ILbVCX7.exe97%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
          jw2ILbVCX7.exe100%AviraTR/Dropper.MSIL.Gen7
          jw2ILbVCX7.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%AviraTR/Dropper.MSIL.Gen7
          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe97%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
          No Antivirus matches
          SourceDetectionScannerLabelLink
          december2nd.ddns.net17%VirustotalBrowse
          december2n.duckdns.org19%VirustotalBrowse
          SourceDetectionScannerLabelLink
          december2nd.ddns.net17%VirustotalBrowse
          december2n.duckdns.org100%Avira URL Cloudmalware
          december2nd.ddns.net100%Avira URL Cloudmalware
          december2n.duckdns.org19%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          december2nd.ddns.net
          212.193.30.230
          truetrueunknown
          december2n.duckdns.org
          192.169.69.26
          truetrueunknown
          NameMaliciousAntivirus DetectionReputation
          december2nd.ddns.nettrue
          • 17%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          december2n.duckdns.orgtrue
          • 19%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          212.193.30.230
          december2nd.ddns.netRussian Federation
          57844SPD-NETTRtrue
          192.169.69.26
          december2n.duckdns.orgUnited States
          23033WOWUStrue
          Joe Sandbox Version:37.1.0 Beryl
          Analysis ID:876048
          Start date and time:2023-05-26 09:29:22 +02:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 9m 14s
          Hypervisor based Inspection enabled:false
          Report type:light
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:12
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample file name:jw2ILbVCX7.exe
          Original Sample Name:beca1cb2ead4d465a208217ac1b189d1.exe
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@10/8@22/2
          EGA Information:
          • Successful, ratio: 100%
          HDC Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe
          • TCP Packets have been reduced to 100
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtDeviceIoControlFile calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          TimeTypeDescription
          09:30:23Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\jw2ILbVCX7.exe" s>$(Arg0)
          09:30:23Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
          09:30:23API Interceptor891x Sleep call for process: jw2ILbVCX7.exe modified
          09:30:23AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\jw2ILbVCX7.exe
          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Category:dropped
          Size (bytes):215040
          Entropy (8bit):7.469302931020199
          Encrypted:false
          SSDEEP:6144:QLV6Bta6dtJmakIM5v+onU9nYdeCUkul:QLV6Btpmk8+ononY0CUX
          MD5:BECA1CB2EAD4D465A208217AC1B189D1
          SHA1:3251EDB9B99C9FF7AD8915073C290B4EE68AE6BA
          SHA-256:EE6820BBCA27CF252B5D81CBBF0FE67A85246B4EEA3C584607640D0F8ADDE5E2
          SHA-512:59D1151DF38C4453F9D42622A7B040AAC54FE29F97BFC54EBB551444FACC47A6B31D66A4E7F0BA22A9FF140658E7A27ADD44C33F9A557076CB0AF13D232E8C6E
          Malicious:true
          Yara Hits:
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth (Nextron Systems)
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth (Nextron Systems)
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Joe Security
          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: ditekSHen
          • Rule: NanoCore, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: unknown
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: Joe Sandbox ML, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 97%
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T.....................~........... ........P.. ......................................................................8...W.... ..xz........................................................................... ............... ..H............text........ ...................... ..`.reloc..............................@..B.rsrc...xz... ...|..................@..@................t.......H...........T............................................................0..Q........o5.......*.o6....-.&......3+..+.... ....3......1..... 2.... ....3.... .......*.*....0..E.......s7....-(&s8....-&&s9....,$&s:........s;........*.....+.....+.....+.....0..........~....o<...*..0..........~....o=...*..0..........~....o>...*..0..........~....o?...*..0..........~....o@...*..0.............-.&(A...*&+...0..$.......~B........-.(...+.-.&+..B...+.~B...*.0.............-.&(A...*&+...0..
          Process:C:\Users\user\Desktop\jw2ILbVCX7.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):26
          Entropy (8bit):3.95006375643621
          Encrypted:false
          SSDEEP:3:ggPYV:rPYV
          MD5:187F488E27DB4AF347237FE461A079AD
          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
          Malicious:true
          Reputation:high, very likely benign file
          Preview:[ZoneTransfer]....ZoneId=0
          Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):525
          Entropy (8bit):5.2874233355119316
          Encrypted:false
          SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
          MD5:61CCF53571C9ABA6511D696CB0D32E45
          SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
          SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
          SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
          Malicious:false
          Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
          Process:C:\Users\user\Desktop\jw2ILbVCX7.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):525
          Entropy (8bit):5.2874233355119316
          Encrypted:false
          SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
          MD5:61CCF53571C9ABA6511D696CB0D32E45
          SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
          SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
          SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
          Malicious:true
          Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
          Process:C:\Users\user\Desktop\jw2ILbVCX7.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1300
          Entropy (8bit):5.126124822814046
          Encrypted:false
          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Gxtn:cbk4oL600QydbQxIYODOLedq3xj
          MD5:A45475C551DF24D890864E53200710D0
          SHA1:3EC83C93F3A5BB082D82488054E41BE48FA58522
          SHA-256:DA1149045379643C10723D4F225CDC0193CA514C0FD314D9B4DE0B29105BF958
          SHA-512:AFF779053DF54FC8F5F5BDD43EE849648EC3A1FC2C5D84186735A5009B21509FB607FD8C6FBC7B1960C8CD7BFE2D6767DE4890DD455774245007C4BAB4702D1E
          Malicious:true
          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
          Process:C:\Users\user\Desktop\jw2ILbVCX7.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:modified
          Size (bytes):1310
          Entropy (8bit):5.109425792877704
          Encrypted:false
          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
          MD5:5C2F41CFC6F988C859DA7D727AC2B62A
          SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
          SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
          SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
          Process:C:\Users\user\Desktop\jw2ILbVCX7.exe
          File Type:data
          Category:dropped
          Size (bytes):8
          Entropy (8bit):3.0
          Encrypted:false
          SSDEEP:3:PjGn:qn
          MD5:C1DB5CC9E0E33ED88D61715E1FBD34F5
          SHA1:9CCB11098559FE79C72D78408FE14549FA4C274F
          SHA-256:C00776E6E49AFD4E941713E88F0002C8631EFB919654600DF0246A573C0A9758
          SHA-512:CC783512BC708CFE1B130ABAF8A7053ECB3DB8AEAC1A92F84460859572A1BD7F9D9906A9E90CCCAF4C20C0FAEE70CB153491908CB481A3F6F9B2F18C997F04CC
          Malicious:true
          Preview:.$...^.H
          Process:C:\Users\user\Desktop\jw2ILbVCX7.exe
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):37
          Entropy (8bit):4.540402352056966
          Encrypted:false
          SSDEEP:3:oNWXp5vPKSJn:oNWXpFRJn
          MD5:35853B6714A1A1C49A5FCF332832D0BC
          SHA1:9DFDFBC08D8F73F905CF11D080E5C4091EA803A1
          SHA-256:0A4BA7D085C2C8DED50425417A0115B13067B2CA7297544981807000D8376CB3
          SHA-512:2259D9DA56EBB4E15BB8EF1592E6AB10AE5E01C59E7E5A3A244ACA48D0CC5F8F8ED4E51851AD023DCFCC4E95BF62707D2D56FFA29F843C55D01636CE8399B24C
          Malicious:false
          Preview:C:\Users\user\Desktop\jw2ILbVCX7.exe
          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Entropy (8bit):7.469302931020199
          TrID:
          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          • Win32 Executable (generic) a (10002005/4) 49.78%
          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
          • Generic Win/DOS Executable (2004/3) 0.01%
          • DOS Executable Generic (2002/1) 0.01%
          File name:jw2ILbVCX7.exe
          File size:215040
          MD5:beca1cb2ead4d465a208217ac1b189d1
          SHA1:3251edb9b99c9ff7ad8915073c290b4ee68ae6ba
          SHA256:ee6820bbca27cf252b5d81cbbf0fe67a85246b4eea3c584607640d0f8adde5e2
          SHA512:59d1151df38c4453f9d42622a7b040aac54fe29f97bfc54ebb551444facc47a6b31d66a4e7f0ba22a9ff140658e7a27add44c33f9a557076cb0af13d232e8c6e
          SSDEEP:6144:QLV6Bta6dtJmakIM5v+onU9nYdeCUkul:QLV6Btpmk8+ononY0CUX
          TLSH:3D24CF26BBB8492FE2DF86B9601211529378C2E399C3F3DE18D855B35F6A7E106071D3
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T.....................~........... ........P.. .....................................................................
          Icon Hash:90cececece8e8eb0
          Entrypoint:0x51e792
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x500000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          DLL Characteristics:
          Time Stamp:0x54E927A1 [Sun Feb 22 00:49:37 2015 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
          Instruction
          jmp dword ptr [00502000h]
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x1e7380x57.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x220000x17a78.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x200000xc.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x20000x1c7980x1c800False0.5945038377192983data6.5980598597415945IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .reloc0x200000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          .rsrc0x220000x17a780x17c00False0.9967002467105263data7.994814486129098IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountry
          RT_RCDATA0x220580x17a20data
          DLLImport
          mscoree.dll_CorExeMain
          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
          192.168.2.3192.169.69.2649699604512025019 05/26/23-09:30:25.340331TCP2025019ET TROJAN Possible NanoCore C2 60B4969960451192.168.2.3192.169.69.26
          192.168.2.3192.169.69.2649706604512025019 05/26/23-09:31:04.760372TCP2025019ET TROJAN Possible NanoCore C2 60B4970660451192.168.2.3192.169.69.26
          192.168.2.3192.169.69.2649713604512025019 05/26/23-09:31:45.263536TCP2025019ET TROJAN Possible NanoCore C2 60B4971360451192.168.2.3192.169.69.26
          192.168.2.3192.169.69.2649717604512025019 05/26/23-09:32:11.307312TCP2025019ET TROJAN Possible NanoCore C2 60B4971760451192.168.2.3192.169.69.26
          192.168.2.3192.169.69.2649707604512025019 05/26/23-09:31:09.762081TCP2025019ET TROJAN Possible NanoCore C2 60B4970760451192.168.2.3192.169.69.26
          192.168.2.3192.169.69.2649718604512025019 05/26/23-09:32:18.263288TCP2025019ET TROJAN Possible NanoCore C2 60B4971860451192.168.2.3192.169.69.26
          192.168.2.3192.169.69.2649700604512025019 05/26/23-09:30:30.811034TCP2025019ET TROJAN Possible NanoCore C2 60B4970060451192.168.2.3192.169.69.26
          192.168.2.3192.169.69.2649712604512025019 05/26/23-09:31:39.755174TCP2025019ET TROJAN Possible NanoCore C2 60B4971260451192.168.2.3192.169.69.26
          192.168.2.3192.169.69.2649701604512025019 05/26/23-09:30:35.827016TCP2025019ET TROJAN Possible NanoCore C2 60B4970160451192.168.2.3192.169.69.26
          192.168.2.3192.169.69.2649705604512025019 05/26/23-09:30:59.250023TCP2025019ET TROJAN Possible NanoCore C2 60B4970560451192.168.2.3192.169.69.26
          192.168.2.3192.169.69.2649711604512025019 05/26/23-09:31:34.268145TCP2025019ET TROJAN Possible NanoCore C2 60B4971160451192.168.2.3192.169.69.26
          192.168.2.3192.169.69.2649719604512025019 05/26/23-09:32:23.314247TCP2025019ET TROJAN Possible NanoCore C2 60B4971960451192.168.2.3192.169.69.26
          TimestampSource PortDest PortSource IPDest IP
          May 26, 2023 09:30:24.652987003 CEST4969960451192.168.2.3192.169.69.26
          May 26, 2023 09:30:25.244465113 CEST6045149699192.169.69.26192.168.2.3
          May 26, 2023 09:30:25.244636059 CEST4969960451192.168.2.3192.169.69.26
          May 26, 2023 09:30:25.340331078 CEST4969960451192.168.2.3192.169.69.26
          May 26, 2023 09:30:25.764339924 CEST6045149699192.169.69.26192.168.2.3
          May 26, 2023 09:30:30.446964979 CEST4970060451192.168.2.3192.169.69.26
          May 26, 2023 09:30:30.760632038 CEST6045149700192.169.69.26192.168.2.3
          May 26, 2023 09:30:30.760843992 CEST4970060451192.168.2.3192.169.69.26
          May 26, 2023 09:30:30.811033964 CEST4970060451192.168.2.3192.169.69.26
          May 26, 2023 09:30:31.261578083 CEST6045149700192.169.69.26192.168.2.3
          May 26, 2023 09:30:35.408437014 CEST4970160451192.168.2.3192.169.69.26
          May 26, 2023 09:30:35.763679028 CEST6045149701192.169.69.26192.168.2.3
          May 26, 2023 09:30:35.763897896 CEST4970160451192.168.2.3192.169.69.26
          May 26, 2023 09:30:35.827016115 CEST4970160451192.168.2.3192.169.69.26
          May 26, 2023 09:30:36.258495092 CEST6045149701192.169.69.26192.168.2.3
          May 26, 2023 09:30:40.381091118 CEST4970260451192.168.2.3212.193.30.230
          May 26, 2023 09:30:40.585769892 CEST6045149702212.193.30.230192.168.2.3
          May 26, 2023 09:30:41.287950039 CEST4970260451192.168.2.3212.193.30.230
          May 26, 2023 09:30:41.493647099 CEST6045149702212.193.30.230192.168.2.3
          May 26, 2023 09:30:42.178509951 CEST4970260451192.168.2.3212.193.30.230
          May 26, 2023 09:30:42.357367992 CEST6045149702212.193.30.230192.168.2.3
          May 26, 2023 09:30:46.512711048 CEST4970360451192.168.2.3212.193.30.230
          May 26, 2023 09:30:46.731578112 CEST6045149703212.193.30.230192.168.2.3
          May 26, 2023 09:30:47.241487026 CEST4970360451192.168.2.3212.193.30.230
          May 26, 2023 09:30:47.450041056 CEST6045149703212.193.30.230192.168.2.3
          May 26, 2023 09:30:47.960237026 CEST4970360451192.168.2.3212.193.30.230
          May 26, 2023 09:30:48.156414986 CEST6045149703212.193.30.230192.168.2.3
          May 26, 2023 09:30:52.262139082 CEST4970460451192.168.2.3212.193.30.230
          May 26, 2023 09:30:52.470011950 CEST6045149704212.193.30.230192.168.2.3
          May 26, 2023 09:30:52.976330996 CEST4970460451192.168.2.3212.193.30.230
          May 26, 2023 09:30:53.196007013 CEST6045149704212.193.30.230192.168.2.3
          May 26, 2023 09:30:53.710804939 CEST4970460451192.168.2.3212.193.30.230
          May 26, 2023 09:30:53.921904087 CEST6045149704212.193.30.230192.168.2.3
          May 26, 2023 09:30:58.733969927 CEST4970560451192.168.2.3192.169.69.26
          May 26, 2023 09:30:59.248977900 CEST6045149705192.169.69.26192.168.2.3
          May 26, 2023 09:30:59.249242067 CEST4970560451192.168.2.3192.169.69.26
          May 26, 2023 09:30:59.250022888 CEST4970560451192.168.2.3192.169.69.26
          May 26, 2023 09:30:59.750202894 CEST6045149705192.169.69.26192.168.2.3
          May 26, 2023 09:31:04.323385000 CEST4970660451192.168.2.3192.169.69.26
          May 26, 2023 09:31:04.759567976 CEST6045149706192.169.69.26192.168.2.3
          May 26, 2023 09:31:04.759752035 CEST4970660451192.168.2.3192.169.69.26
          May 26, 2023 09:31:04.760371923 CEST4970660451192.168.2.3192.169.69.26
          May 26, 2023 09:31:05.252841949 CEST6045149706192.169.69.26192.168.2.3
          May 26, 2023 09:31:09.356288910 CEST4970760451192.168.2.3192.169.69.26
          May 26, 2023 09:31:09.761302948 CEST6045149707192.169.69.26192.168.2.3
          May 26, 2023 09:31:09.762080908 CEST4970760451192.168.2.3192.169.69.26
          May 26, 2023 09:31:09.762080908 CEST4970760451192.168.2.3192.169.69.26
          May 26, 2023 09:31:10.256534100 CEST6045149707192.169.69.26192.168.2.3
          May 26, 2023 09:31:14.829642057 CEST4970860451192.168.2.3212.193.30.230
          May 26, 2023 09:31:15.204277039 CEST6045149708212.193.30.230192.168.2.3
          May 26, 2023 09:31:15.712672949 CEST4970860451192.168.2.3212.193.30.230
          May 26, 2023 09:31:15.955888033 CEST6045149708212.193.30.230192.168.2.3
          May 26, 2023 09:31:16.462724924 CEST4970860451192.168.2.3212.193.30.230
          May 26, 2023 09:31:16.782919884 CEST6045149708212.193.30.230192.168.2.3
          May 26, 2023 09:31:21.422700882 CEST4970960451192.168.2.3212.193.30.230
          May 26, 2023 09:31:21.712985992 CEST6045149709212.193.30.230192.168.2.3
          May 26, 2023 09:31:22.228986025 CEST4970960451192.168.2.3212.193.30.230
          May 26, 2023 09:31:22.448625088 CEST6045149709212.193.30.230192.168.2.3
          May 26, 2023 09:31:22.963390112 CEST4970960451192.168.2.3212.193.30.230
          May 26, 2023 09:31:23.193901062 CEST6045149709212.193.30.230192.168.2.3
          May 26, 2023 09:31:27.329926968 CEST4971060451192.168.2.3212.193.30.230
          May 26, 2023 09:31:27.561769009 CEST6045149710212.193.30.230192.168.2.3
          May 26, 2023 09:31:28.073050022 CEST4971060451192.168.2.3212.193.30.230
          May 26, 2023 09:31:28.373563051 CEST6045149710212.193.30.230192.168.2.3
          May 26, 2023 09:31:28.885606050 CEST4971060451192.168.2.3212.193.30.230
          May 26, 2023 09:31:29.136476040 CEST6045149710212.193.30.230192.168.2.3
          May 26, 2023 09:31:34.008666039 CEST4971160451192.168.2.3192.169.69.26
          May 26, 2023 09:31:34.267311096 CEST6045149711192.169.69.26192.168.2.3
          May 26, 2023 09:31:34.267445087 CEST4971160451192.168.2.3192.169.69.26
          May 26, 2023 09:31:34.268145084 CEST4971160451192.168.2.3192.169.69.26
          May 26, 2023 09:31:34.752247095 CEST6045149711192.169.69.26192.168.2.3
          May 26, 2023 09:31:39.140110970 CEST4971260451192.168.2.3192.169.69.26
          May 26, 2023 09:31:39.742539883 CEST6045149712192.169.69.26192.168.2.3
          May 26, 2023 09:31:39.742714882 CEST4971260451192.168.2.3192.169.69.26
          May 26, 2023 09:31:39.755173922 CEST4971260451192.168.2.3192.169.69.26
          May 26, 2023 09:31:40.250447989 CEST6045149712192.169.69.26192.168.2.3
          May 26, 2023 09:31:44.892985106 CEST4971360451192.168.2.3192.169.69.26
          May 26, 2023 09:31:45.262101889 CEST6045149713192.169.69.26192.168.2.3
          May 26, 2023 09:31:45.262805939 CEST4971360451192.168.2.3192.169.69.26
          May 26, 2023 09:31:45.263535976 CEST4971360451192.168.2.3192.169.69.26
          May 26, 2023 09:31:45.755920887 CEST6045149713192.169.69.26192.168.2.3
          May 26, 2023 09:31:51.904215097 CEST4971460451192.168.2.3212.193.30.230
          May 26, 2023 09:31:52.107399940 CEST6045149714212.193.30.230192.168.2.3
          May 26, 2023 09:31:52.608714104 CEST4971460451192.168.2.3212.193.30.230
          May 26, 2023 09:31:52.828514099 CEST6045149714212.193.30.230192.168.2.3
          May 26, 2023 09:31:53.343138933 CEST4971460451192.168.2.3212.193.30.230
          May 26, 2023 09:31:53.550514936 CEST6045149714212.193.30.230192.168.2.3
          May 26, 2023 09:31:57.937937021 CEST4971560451192.168.2.3212.193.30.230
          May 26, 2023 09:31:58.185499907 CEST6045149715212.193.30.230192.168.2.3
          May 26, 2023 09:31:58.687335968 CEST4971560451192.168.2.3212.193.30.230
          May 26, 2023 09:31:58.918368101 CEST6045149715212.193.30.230192.168.2.3
          May 26, 2023 09:31:59.421833038 CEST4971560451192.168.2.3212.193.30.230
          May 26, 2023 09:31:59.642385006 CEST6045149715212.193.30.230192.168.2.3
          May 26, 2023 09:32:03.706192017 CEST4971660451192.168.2.3212.193.30.230
          May 26, 2023 09:32:03.927897930 CEST6045149716212.193.30.230192.168.2.3
          May 26, 2023 09:32:04.437803984 CEST4971660451192.168.2.3212.193.30.230
          May 26, 2023 09:32:04.644476891 CEST6045149716212.193.30.230192.168.2.3
          May 26, 2023 09:32:05.156653881 CEST4971660451192.168.2.3212.193.30.230
          May 26, 2023 09:32:05.390609026 CEST6045149716212.193.30.230192.168.2.3
          May 26, 2023 09:32:10.799665928 CEST4971760451192.168.2.3192.169.69.26
          TimestampSource PortDest PortSource IPDest IP
          May 26, 2023 09:30:24.501882076 CEST5238753192.168.2.38.8.8.8
          May 26, 2023 09:30:24.615561962 CEST53523878.8.8.8192.168.2.3
          May 26, 2023 09:30:30.323267937 CEST5692453192.168.2.38.8.8.8
          May 26, 2023 09:30:30.445596933 CEST53569248.8.8.8192.168.2.3
          May 26, 2023 09:30:35.382759094 CEST6062553192.168.2.38.8.8.8
          May 26, 2023 09:30:35.406225920 CEST53606258.8.8.8192.168.2.3
          May 26, 2023 09:30:40.344777107 CEST4930253192.168.2.38.8.8.8
          May 26, 2023 09:30:40.379232883 CEST53493028.8.8.8192.168.2.3
          May 26, 2023 09:30:46.474021912 CEST5397553192.168.2.38.8.8.8
          May 26, 2023 09:30:46.511017084 CEST53539758.8.8.8192.168.2.3
          May 26, 2023 09:30:52.229507923 CEST5113953192.168.2.38.8.8.8
          May 26, 2023 09:30:52.255635023 CEST53511398.8.8.8192.168.2.3
          May 26, 2023 09:30:58.618963003 CEST5295553192.168.2.38.8.8.8
          May 26, 2023 09:30:58.731432915 CEST53529558.8.8.8192.168.2.3
          May 26, 2023 09:31:04.198656082 CEST6058253192.168.2.38.8.8.8
          May 26, 2023 09:31:04.321104050 CEST53605828.8.8.8192.168.2.3
          May 26, 2023 09:31:09.334753036 CEST5713453192.168.2.38.8.8.8
          May 26, 2023 09:31:09.354583025 CEST53571348.8.8.8192.168.2.3
          May 26, 2023 09:31:14.642853022 CEST6205053192.168.2.38.8.8.8
          May 26, 2023 09:31:14.671478033 CEST53620508.8.8.8192.168.2.3
          May 26, 2023 09:31:21.394047976 CEST5604253192.168.2.38.8.8.8
          May 26, 2023 09:31:21.420707941 CEST53560428.8.8.8192.168.2.3
          May 26, 2023 09:31:27.298899889 CEST5963653192.168.2.38.8.8.8
          May 26, 2023 09:31:27.327780962 CEST53596368.8.8.8192.168.2.3
          May 26, 2023 09:31:33.882709980 CEST5563853192.168.2.38.8.8.8
          May 26, 2023 09:31:34.004117012 CEST53556388.8.8.8192.168.2.3
          May 26, 2023 09:31:38.819503069 CEST5770453192.168.2.38.8.8.8
          May 26, 2023 09:31:38.933307886 CEST53577048.8.8.8192.168.2.3
          May 26, 2023 09:31:44.862737894 CEST6532053192.168.2.38.8.8.8
          May 26, 2023 09:31:44.891343117 CEST53653208.8.8.8192.168.2.3
          May 26, 2023 09:31:51.873344898 CEST6076753192.168.2.38.8.8.8
          May 26, 2023 09:31:51.902283907 CEST53607678.8.8.8192.168.2.3
          May 26, 2023 09:31:57.900551081 CEST6510753192.168.2.38.8.8.8
          May 26, 2023 09:31:57.936043978 CEST53651078.8.8.8192.168.2.3
          May 26, 2023 09:32:03.683854103 CEST5384853192.168.2.38.8.8.8
          May 26, 2023 09:32:03.704530001 CEST53538488.8.8.8192.168.2.3
          May 26, 2023 09:32:09.667361975 CEST5757153192.168.2.38.8.8.8
          May 26, 2023 09:32:09.695261002 CEST53575718.8.8.8192.168.2.3
          May 26, 2023 09:32:16.277008057 CEST5869153192.168.2.38.8.8.8
          May 26, 2023 09:32:17.352468014 CEST5869153192.168.2.38.8.8.8
          May 26, 2023 09:32:17.817212105 CEST53586918.8.8.8192.168.2.3
          May 26, 2023 09:32:17.817364931 CEST53586918.8.8.8192.168.2.3
          May 26, 2023 09:32:22.778075933 CEST5330553192.168.2.38.8.8.8
          May 26, 2023 09:32:22.900695086 CEST53533058.8.8.8192.168.2.3
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          May 26, 2023 09:30:24.501882076 CEST192.168.2.38.8.8.80x85abStandard query (0)december2n.duckdns.orgA (IP address)IN (0x0001)false
          May 26, 2023 09:30:30.323267937 CEST192.168.2.38.8.8.80x3dd9Standard query (0)december2n.duckdns.orgA (IP address)IN (0x0001)false
          May 26, 2023 09:30:35.382759094 CEST192.168.2.38.8.8.80xac83Standard query (0)december2n.duckdns.orgA (IP address)IN (0x0001)false
          May 26, 2023 09:30:40.344777107 CEST192.168.2.38.8.8.80xf519Standard query (0)december2nd.ddns.netA (IP address)IN (0x0001)false
          May 26, 2023 09:30:46.474021912 CEST192.168.2.38.8.8.80x83a1Standard query (0)december2nd.ddns.netA (IP address)IN (0x0001)false
          May 26, 2023 09:30:52.229507923 CEST192.168.2.38.8.8.80xbdfcStandard query (0)december2nd.ddns.netA (IP address)IN (0x0001)false
          May 26, 2023 09:30:58.618963003 CEST192.168.2.38.8.8.80xb7eeStandard query (0)december2n.duckdns.orgA (IP address)IN (0x0001)false
          May 26, 2023 09:31:04.198656082 CEST192.168.2.38.8.8.80x8c29Standard query (0)december2n.duckdns.orgA (IP address)IN (0x0001)false
          May 26, 2023 09:31:09.334753036 CEST192.168.2.38.8.8.80x8855Standard query (0)december2n.duckdns.orgA (IP address)IN (0x0001)false
          May 26, 2023 09:31:14.642853022 CEST192.168.2.38.8.8.80x4900Standard query (0)december2nd.ddns.netA (IP address)IN (0x0001)false
          May 26, 2023 09:31:21.394047976 CEST192.168.2.38.8.8.80x85b9Standard query (0)december2nd.ddns.netA (IP address)IN (0x0001)false
          May 26, 2023 09:31:27.298899889 CEST192.168.2.38.8.8.80x7fddStandard query (0)december2nd.ddns.netA (IP address)IN (0x0001)false
          May 26, 2023 09:31:33.882709980 CEST192.168.2.38.8.8.80x227bStandard query (0)december2n.duckdns.orgA (IP address)IN (0x0001)false
          May 26, 2023 09:31:38.819503069 CEST192.168.2.38.8.8.80xcbb8Standard query (0)december2n.duckdns.orgA (IP address)IN (0x0001)false
          May 26, 2023 09:31:44.862737894 CEST192.168.2.38.8.8.80x6712Standard query (0)december2n.duckdns.orgA (IP address)IN (0x0001)false
          May 26, 2023 09:31:51.873344898 CEST192.168.2.38.8.8.80x4fc7Standard query (0)december2nd.ddns.netA (IP address)IN (0x0001)false
          May 26, 2023 09:31:57.900551081 CEST192.168.2.38.8.8.80xd023Standard query (0)december2nd.ddns.netA (IP address)IN (0x0001)false
          May 26, 2023 09:32:03.683854103 CEST192.168.2.38.8.8.80xe83cStandard query (0)december2nd.ddns.netA (IP address)IN (0x0001)false
          May 26, 2023 09:32:09.667361975 CEST192.168.2.38.8.8.80x7eb1Standard query (0)december2n.duckdns.orgA (IP address)IN (0x0001)false
          May 26, 2023 09:32:16.277008057 CEST192.168.2.38.8.8.80x3bdfStandard query (0)december2n.duckdns.orgA (IP address)IN (0x0001)false
          May 26, 2023 09:32:17.352468014 CEST192.168.2.38.8.8.80x3bdfStandard query (0)december2n.duckdns.orgA (IP address)IN (0x0001)false
          May 26, 2023 09:32:22.778075933 CEST192.168.2.38.8.8.80x14c4Standard query (0)december2n.duckdns.orgA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          May 26, 2023 09:30:24.615561962 CEST8.8.8.8192.168.2.30x85abNo error (0)december2n.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
          May 26, 2023 09:30:30.445596933 CEST8.8.8.8192.168.2.30x3dd9No error (0)december2n.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
          May 26, 2023 09:30:35.406225920 CEST8.8.8.8192.168.2.30xac83No error (0)december2n.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
          May 26, 2023 09:30:40.379232883 CEST8.8.8.8192.168.2.30xf519No error (0)december2nd.ddns.net212.193.30.230A (IP address)IN (0x0001)false
          May 26, 2023 09:30:46.511017084 CEST8.8.8.8192.168.2.30x83a1No error (0)december2nd.ddns.net212.193.30.230A (IP address)IN (0x0001)false
          May 26, 2023 09:30:52.255635023 CEST8.8.8.8192.168.2.30xbdfcNo error (0)december2nd.ddns.net212.193.30.230A (IP address)IN (0x0001)false
          May 26, 2023 09:30:58.731432915 CEST8.8.8.8192.168.2.30xb7eeNo error (0)december2n.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
          May 26, 2023 09:31:04.321104050 CEST8.8.8.8192.168.2.30x8c29No error (0)december2n.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
          May 26, 2023 09:31:09.354583025 CEST8.8.8.8192.168.2.30x8855No error (0)december2n.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
          May 26, 2023 09:31:14.671478033 CEST8.8.8.8192.168.2.30x4900No error (0)december2nd.ddns.net212.193.30.230A (IP address)IN (0x0001)false
          May 26, 2023 09:31:21.420707941 CEST8.8.8.8192.168.2.30x85b9No error (0)december2nd.ddns.net212.193.30.230A (IP address)IN (0x0001)false
          May 26, 2023 09:31:27.327780962 CEST8.8.8.8192.168.2.30x7fddNo error (0)december2nd.ddns.net212.193.30.230A (IP address)IN (0x0001)false
          May 26, 2023 09:31:34.004117012 CEST8.8.8.8192.168.2.30x227bNo error (0)december2n.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
          May 26, 2023 09:31:38.933307886 CEST8.8.8.8192.168.2.30xcbb8No error (0)december2n.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
          May 26, 2023 09:31:44.891343117 CEST8.8.8.8192.168.2.30x6712No error (0)december2n.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
          May 26, 2023 09:31:51.902283907 CEST8.8.8.8192.168.2.30x4fc7No error (0)december2nd.ddns.net212.193.30.230A (IP address)IN (0x0001)false
          May 26, 2023 09:31:57.936043978 CEST8.8.8.8192.168.2.30xd023No error (0)december2nd.ddns.net212.193.30.230A (IP address)IN (0x0001)false
          May 26, 2023 09:32:03.704530001 CEST8.8.8.8192.168.2.30xe83cNo error (0)december2nd.ddns.net212.193.30.230A (IP address)IN (0x0001)false
          May 26, 2023 09:32:09.695261002 CEST8.8.8.8192.168.2.30x7eb1No error (0)december2n.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
          May 26, 2023 09:32:17.817212105 CEST8.8.8.8192.168.2.30x3bdfNo error (0)december2n.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
          May 26, 2023 09:32:17.817364931 CEST8.8.8.8192.168.2.30x3bdfNo error (0)december2n.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
          May 26, 2023 09:32:22.900695086 CEST8.8.8.8192.168.2.30x14c4No error (0)december2n.duckdns.org192.169.69.26A (IP address)IN (0x0001)false

          Click to jump to process

          Target ID:0
          Start time:09:30:22
          Start date:26/05/2023
          Path:C:\Users\user\Desktop\jw2ILbVCX7.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\jw2ILbVCX7.exe
          Imagebase:0x670000
          File size:215040 bytes
          MD5 hash:BECA1CB2EAD4D465A208217AC1B189D1
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.645832197.0000000005930000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.645832197.0000000005930000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000000.00000002.645832197.0000000005930000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.645832197.0000000005930000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000000.368834831.0000000000672000.00000002.00000001.01000000.00000003.sdmp, Author: Florian Roth (Nextron Systems)
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000000.368834831.0000000000672000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000000.00000000.368834831.0000000000672000.00000002.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000000.368834831.0000000000672000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.645656923.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.645656923.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000000.00000002.645656923.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.645656923.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.645871360.0000000005940000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.637063584.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
          Reputation:low

          Target ID:1
          Start time:09:30:23
          Start date:26/05/2023
          Path:C:\Windows\SysWOW64\schtasks.exe
          Wow64 process (32bit):true
          Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpDC9A.tmp
          Imagebase:0x20000
          File size:185856 bytes
          MD5 hash:15FF7D8324231381BAD48A052F85DF04
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:2
          Start time:09:30:23
          Start date:26/05/2023
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff745070000
          File size:625664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:3
          Start time:09:30:23
          Start date:26/05/2023
          Path:C:\Windows\SysWOW64\schtasks.exe
          Wow64 process (32bit):true
          Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpDDF3.tmp
          Imagebase:0x20000
          File size:185856 bytes
          MD5 hash:15FF7D8324231381BAD48A052F85DF04
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:4
          Start time:09:30:23
          Start date:26/05/2023
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff745070000
          File size:625664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:5
          Start time:09:30:23
          Start date:26/05/2023
          Path:C:\Users\user\Desktop\jw2ILbVCX7.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\jw2ILbVCX7.exe 0
          Imagebase:0xa40000
          File size:215040 bytes
          MD5 hash:BECA1CB2EAD4D465A208217AC1B189D1
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.387696343.0000000003041000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.387696343.0000000003041000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000005.00000002.387696343.0000000003041000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000005.00000002.387807727.0000000004041000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
          Reputation:low

          Target ID:6
          Start time:09:30:23
          Start date:26/05/2023
          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Wow64 process (32bit):true
          Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
          Imagebase:0x210000
          File size:215040 bytes
          MD5 hash:BECA1CB2EAD4D465A208217AC1B189D1
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000002.388017452.0000000002831000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth (Nextron Systems)
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth (Nextron Systems)
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Joe Security
          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: ditekSHen
          • Rule: NanoCore, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: unknown
          Antivirus matches:
          • Detection: 100%, Avira
          • Detection: 100%, Joe Sandbox ML
          • Detection: 97%, ReversingLabs
          Reputation:low

          Target ID:7
          Start time:09:30:31
          Start date:26/05/2023
          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          Wow64 process (32bit):true
          Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
          Imagebase:0xd50000
          File size:215040 bytes
          MD5 hash:BECA1CB2EAD4D465A208217AC1B189D1
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:.Net C# or VB.NET
          Reputation:low

          No disassembly