Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SAaX2wNRn2.exe

Overview

General Information

Sample Name:SAaX2wNRn2.exe
Original Sample Name:e89323dd0063fb87b2115af014bbaf94.exe
Analysis ID:878777
MD5:e89323dd0063fb87b2115af014bbaf94
SHA1:788e5fcae9e19827a9e2a3238cf17c50a737d948
SHA256:70d856cfc4e27c7ca18c939fd13fb989a308c64c0cd78d5d6f07759cc355c3db
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • SAaX2wNRn2.exe (PID: 2152 cmdline: C:\Users\user\Desktop\SAaX2wNRn2.exe MD5: E89323DD0063FB87B2115AF014BBAF94)
    • SAaX2wNRn2.exe (PID: 2888 cmdline: C:\Users\user\Desktop\SAaX2wNRn2.exe MD5: E89323DD0063FB87B2115AF014BBAF94)
      • schtasks.exe (PID: 5312 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp1C83.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 4048 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5744 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp1E68.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • SAaX2wNRn2.exe (PID: 2244 cmdline: C:\Users\user\Desktop\SAaX2wNRn2.exe 0 MD5: E89323DD0063FB87B2115AF014BBAF94)
    • SAaX2wNRn2.exe (PID: 6852 cmdline: C:\Users\user\Desktop\SAaX2wNRn2.exe MD5: E89323DD0063FB87B2115AF014BBAF94)
    • SAaX2wNRn2.exe (PID: 5708 cmdline: C:\Users\user\Desktop\SAaX2wNRn2.exe MD5: E89323DD0063FB87B2115AF014BBAF94)
    • SAaX2wNRn2.exe (PID: 6840 cmdline: C:\Users\user\Desktop\SAaX2wNRn2.exe MD5: E89323DD0063FB87B2115AF014BBAF94)
  • dhcpmon.exe (PID: 2844 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: E89323DD0063FB87B2115AF014BBAF94)
    • dhcpmon.exe (PID: 6744 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: E89323DD0063FB87B2115AF014BBAF94)
    • dhcpmon.exe (PID: 5788 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: E89323DD0063FB87B2115AF014BBAF94)
  • dhcpmon.exe (PID: 4984 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: E89323DD0063FB87B2115AF014BBAF94)
    • dhcpmon.exe (PID: 3712 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: E89323DD0063FB87B2115AF014BBAF94)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "540c4d56-ad4d-4ca4-9f9f-305dba1d", "Group": "Default", "Domain1": "jasonbourneblack.ddns.net", "Domain2": "127.0.0.1", "Port": 4032, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.684510708.0000000006B60000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0x5b0b:$x1: NanoCore.ClientPluginHost
  • 0x5b44:$x2: IClientNetworkHost
00000001.00000002.684510708.0000000006B60000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
  • 0x5b0b:$x2: NanoCore.ClientPluginHost
  • 0x5c0f:$s4: PipeCreated
  • 0x5b25:$s5: IClientLoggingHost
00000001.00000002.684510708.0000000006B60000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x5b87:$x2: NanoCore.ClientPlugin
  • 0x5b0b:$x3: NanoCore.ClientPluginHost
  • 0x5b9d:$i3: IClientNetwork
  • 0x5b25:$i6: IClientLoggingHost
  • 0x5b44:$i7: IClientNetworkHost
  • 0x57fb:$s1: ClientPlugin
  • 0x5b90:$s1: ClientPlugin
  • 0x6cf4:$s3: IPAddress
00000001.00000002.684510708.0000000006B60000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x5b0b:$a1: NanoCore.ClientPluginHost
  • 0x5b87:$a2: NanoCore.ClientPlugin
  • 0x6710:$b7: LogClientException
  • 0x5b25:$b9: IClientLoggingHost
00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
  • 0x55d87:$a: NanoCore
  • 0x55e71:$a: NanoCore
  • 0x56ce8:$a: NanoCore
  • 0x5fe92:$a: NanoCore
  • 0x5fef3:$a: NanoCore
  • 0x5ff36:$a: NanoCore
  • 0x5ff76:$a: NanoCore
  • 0x601b2:$a: NanoCore
  • 0x60252:$a: NanoCore
  • 0x60a2a:$a: NanoCore
  • 0x6101d:$a: NanoCore
  • 0x6116e:$a: NanoCore
  • 0x61fc8:$a: NanoCore
  • 0x6222f:$a: NanoCore
  • 0x62244:$a: NanoCore
  • 0x62263:$a: NanoCore
  • 0x6b166:$a: NanoCore
  • 0x6b18f:$a: NanoCore
  • 0x76f08:$a: NanoCore
  • 0x76f31:$a: NanoCore
  • 0x9bdf4:$a: NanoCore
Click to see the 94 entries
SourceRuleDescriptionAuthorStrings
1.2.SAaX2wNRn2.exe.3c597c7.12.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0x1deb:$x1: NanoCore.ClientPluginHost
  • 0x1e24:$x2: IClientNetworkHost
1.2.SAaX2wNRn2.exe.3c597c7.12.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
  • 0x1deb:$x2: NanoCore.ClientPluginHost
  • 0x1f36:$s4: PipeCreated
  • 0x1e05:$s5: IClientLoggingHost
1.2.SAaX2wNRn2.exe.3c597c7.12.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x1e8b:$x2: NanoCore.ClientPlugin
  • 0x1deb:$x3: NanoCore.ClientPluginHost
  • 0x1ea1:$i3: IClientNetwork
  • 0x1e43:$i5: IClientDataHost
  • 0x1e05:$i6: IClientLoggingHost
  • 0x1e24:$i7: IClientNetworkHost
  • 0x266c:$i9: IClientNameObjectCollection
  • 0x1b41:$s1: ClientPlugin
  • 0x1e94:$s1: ClientPlugin
  • 0x2a80:$s2: EndPoint
  • 0x2771:$s3: IPAddress
  • 0x2083:$s4: IPEndPoint
  • 0x27a3:$s7: get_Connected
1.2.SAaX2wNRn2.exe.3c597c7.12.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x1deb:$a1: NanoCore.ClientPluginHost
  • 0x1e8b:$a2: NanoCore.ClientPlugin
  • 0x2be1:$b7: LogClientException
  • 0x1e05:$b9: IClientLoggingHost
1.2.SAaX2wNRn2.exe.6bb0000.27.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0x3d99:$x1: NanoCore.ClientPluginHost
  • 0x3db3:$x2: IClientNetworkHost
Click to see the 265 entries

AV Detection

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\SAaX2wNRn2.exe, ProcessId: 2888, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

E-Banking Fraud

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\SAaX2wNRn2.exe, ProcessId: 2888, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Persistence and Installation Behavior

barindex
Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp1C83.tmp, CommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp1C83.tmp, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\SAaX2wNRn2.exe, ParentImage: C:\Users\user\Desktop\SAaX2wNRn2.exe, ParentProcessId: 2888, ParentProcessName: SAaX2wNRn2.exe, ProcessCommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp1C83.tmp, ProcessId: 5312, ProcessName: schtasks.exe

Stealing of Sensitive Information

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\SAaX2wNRn2.exe, ProcessId: 2888, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Remote Access Functionality

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\SAaX2wNRn2.exe, ProcessId: 2888, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
Timestamp:192.168.2.5141.98.6.1674972340322816766 05/31/23-07:53:03.283583
SID:2816766
Source Port:49723
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674971640322816766 05/31/23-07:52:13.461105
SID:2816766
Source Port:49716
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674971840322025019 05/31/23-07:52:31.617417
SID:2025019
Source Port:49718
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674972840322025019 05/31/23-07:53:33.869411
SID:2025019
Source Port:49728
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674972940322816766 05/31/23-07:53:43.288922
SID:2816766
Source Port:49729
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674973340322816766 05/31/23-07:54:08.525317
SID:2816766
Source Port:49733
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674973240322025019 05/31/23-07:54:01.126019
SID:2025019
Source Port:49732
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674971940322816766 05/31/23-07:52:40.572861
SID:2816766
Source Port:49719
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674971940322025019 05/31/23-07:52:39.496237
SID:2025019
Source Port:49719
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674972240322025019 05/31/23-07:52:54.172177
SID:2025019
Source Port:49722
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674973040322816766 05/31/23-07:53:49.430104
SID:2816766
Source Port:49730
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:141.98.6.167192.168.2.54032497182810290 05/31/23-07:52:32.211435
SID:2810290
Source Port:4032
Destination Port:49718
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674973240322816718 05/31/23-07:54:02.704983
SID:2816718
Source Port:49732
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674971640322025019 05/31/23-07:52:11.267334
SID:2025019
Source Port:49716
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674972040322816766 05/31/23-07:52:48.788255
SID:2816766
Source Port:49720
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674972440322816766 05/31/23-07:53:09.525595
SID:2816766
Source Port:49724
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674972540322025019 05/31/23-07:53:15.239239
SID:2025019
Source Port:49725
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674973140322025019 05/31/23-07:53:54.566547
SID:2025019
Source Port:49731
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674972940322025019 05/31/23-07:53:42.302533
SID:2025019
Source Port:49729
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674973140322816766 05/31/23-07:53:56.008756
SID:2816766
Source Port:49731
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674971840322816766 05/31/23-07:52:32.730530
SID:2816766
Source Port:49718
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674972840322816766 05/31/23-07:53:36.859358
SID:2816766
Source Port:49728
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674972340322025019 05/31/23-07:53:02.033758
SID:2025019
Source Port:49723
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:141.98.6.167192.168.2.54032497332841753 05/31/23-07:54:23.318530
SID:2841753
Source Port:4032
Destination Port:49733
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674972040322025019 05/31/23-07:52:47.324081
SID:2025019
Source Port:49720
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674972640322025019 05/31/23-07:53:20.721069
SID:2025019
Source Port:49726
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674973040322025019 05/31/23-07:53:48.374058
SID:2025019
Source Port:49730
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:141.98.6.167192.168.2.54032497252841753 05/31/23-07:53:15.269919
SID:2841753
Source Port:4032
Destination Port:49725
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:141.98.6.167192.168.2.54032497172841753 05/31/23-07:52:25.058340
SID:2841753
Source Port:4032
Destination Port:49717
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674972240322816766 05/31/23-07:52:55.998811
SID:2816766
Source Port:49722
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674972440322025019 05/31/23-07:53:08.375676
SID:2025019
Source Port:49724
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674972740322816766 05/31/23-07:53:28.901780
SID:2816766
Source Port:49727
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674971740322816766 05/31/23-07:52:22.187780
SID:2816766
Source Port:49717
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674971740322025019 05/31/23-07:52:20.026839
SID:2025019
Source Port:49717
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674972640322816766 05/31/23-07:53:21.715954
SID:2816766
Source Port:49726
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674972040322816718 05/31/23-07:52:47.571898
SID:2816718
Source Port:49720
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674973240322816766 05/31/23-07:54:02.704983
SID:2816766
Source Port:49732
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674972740322025019 05/31/23-07:53:27.404072
SID:2025019
Source Port:49727
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:192.168.2.5141.98.6.1674973340322025019 05/31/23-07:54:08.288405
SID:2025019
Source Port:49733
Destination Port:4032
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 0000000C.00000002.458436332.0000000003281000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "540c4d56-ad4d-4ca4-9f9f-305dba1d", "Group": "Default", "Domain1": "jasonbourneblack.ddns.net", "Domain2": "127.0.0.1", "Port": 4032, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
Source: SAaX2wNRn2.exeReversingLabs: Detection: 37%
Source: jasonbourneblack.ddns.netAvira URL Cloud: Label: malware
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 37%
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.51b0000.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.438a808.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.51b4629.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.3940518.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.51b0000.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.37b0188.8.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.3a8ebc9.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.39052f0.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.3aaf42a.14.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.37b0188.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.3a9adfd.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0000000E.00000002.450850684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000C.00000002.458436332.0000000003281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000E.00000002.462495853.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.660971375.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.396639113.0000000003771000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.396639113.000000000438A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: SAaX2wNRn2.exe PID: 2888, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5788, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: SAaX2wNRn2.exe PID: 6840, type: MEMORYSTR
Source: SAaX2wNRn2.exeJoe Sandbox ML: detected
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
Source: SAaX2wNRn2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SAaX2wNRn2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: qiVgpo.pdbSHA256 source: SAaX2wNRn2.exe, dhcpmon.exe.1.dr
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: SAaX2wNRn2.exe, 00000001.00000002.684510708.0000000006B60000.00000004.08000000.00040000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.684858574.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.684687442.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: qiVgpo.pdb source: SAaX2wNRn2.exe, dhcpmon.exe.1.dr
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.684333491.0000000006A10000.00000004.08000000.00040000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.684765718.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.684621973.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp

Networking

barindex
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49716 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49716 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49717 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49717 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 141.98.6.167:4032 -> 192.168.2.5:49717
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49718 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49718 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 141.98.6.167:4032 -> 192.168.2.5:49718
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49719 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49719 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49720 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49720 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.5:49720 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49722 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49722 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49723 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49723 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49724 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49724 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49725 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 141.98.6.167:4032 -> 192.168.2.5:49725
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49726 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49726 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49727 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49727 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49728 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49728 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49729 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49729 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49730 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49730 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49731 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49731 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49732 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49732 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.5:49732 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49733 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49733 -> 141.98.6.167:4032
Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 141.98.6.167:4032 -> 192.168.2.5:49733
Source: Malware configuration extractorURLs: jasonbourneblack.ddns.net
Source: Malware configuration extractorURLs: 127.0.0.1
Source: unknownDNS query: name: jasonbourneblack.ddns.net
Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
Source: Joe Sandbox ViewIP Address: 141.98.6.167 141.98.6.167
Source: global trafficTCP traffic: 192.168.2.5:49716 -> 141.98.6.167:4032
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.684765718.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://google.com
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: unknownDNS traffic detected: queries for: jasonbourneblack.ddns.net
Source: SAaX2wNRn2.exe, 00000000.00000002.394261730.0000000000AD9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Source: SAaX2wNRn2.exe, 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

E-Banking Fraud

barindex
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.51b0000.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.438a808.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.51b4629.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.3940518.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.51b0000.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.37b0188.8.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.3a8ebc9.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.39052f0.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.3aaf42a.14.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.37b0188.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.3a9adfd.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0000000E.00000002.450850684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000C.00000002.458436332.0000000003281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000E.00000002.462495853.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.660971375.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.396639113.0000000003771000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.396639113.000000000438A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: SAaX2wNRn2.exe PID: 2888, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5788, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: SAaX2wNRn2.exe PID: 6840, type: MEMORYSTR

System Summary

barindex
Source: 1.2.SAaX2wNRn2.exe.3c597c7.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.3c597c7.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.3c597c7.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6bb0000.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6bb0000.27.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6bb0000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 12.2.dhcpmon.exe.42e95f8.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 12.2.dhcpmon.exe.42e95f8.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 12.2.dhcpmon.exe.42e95f8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6c40000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6c40000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6c40000.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6360000.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6360000.20.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6360000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 12.2.dhcpmon.exe.42d060c.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 12.2.dhcpmon.exe.42d060c.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 12.2.dhcpmon.exe.42d060c.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6bb0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6bb0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6bb0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.51b0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.51b0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.51b0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.3909930.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.3909930.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.3909930.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6be0000.31.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6be0000.31.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6be0000.31.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.3909930.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.3909930.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.3909930.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.SAaX2wNRn2.exe.438a808.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6b60000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6b60000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6b60000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.SAaX2wNRn2.exe.438a808.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.SAaX2wNRn2.exe.438a808.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.SAaX2wNRn2.exe.438a808.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.2943c9c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.2943c9c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.2943c9c.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.4fa0000.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.4fa0000.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.4fa0000.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.3a8ebc9.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.3a8ebc9.11.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.3a8ebc9.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.51b4629.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.51b4629.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.51b4629.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6b70000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6b70000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6b70000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6bee8a4.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6bee8a4.30.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6bee8a4.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.3c625f6.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.3c625f6.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.3c625f6.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.29339c4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.29339c4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.29339c4.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.SAaX2wNRn2.exe.29339c4.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6b80000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6b80000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6b80000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.SAaX2wNRn2.exe.3940518.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 0.2.SAaX2wNRn2.exe.3940518.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.SAaX2wNRn2.exe.3940518.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.SAaX2wNRn2.exe.3940518.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.3c597c7.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.3c597c7.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.3c597c7.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.SAaX2wNRn2.exe.3c597c7.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6be4c9f.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6be4c9f.29.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6be4c9f.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.2991884.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 14.2.SAaX2wNRn2.exe.30f9550.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.2991884.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.2991884.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 14.2.SAaX2wNRn2.exe.30f9550.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 14.2.SAaX2wNRn2.exe.30f9550.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 12.2.dhcpmon.exe.42cb7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 12.2.dhcpmon.exe.42cb7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 12.2.dhcpmon.exe.42cb7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6be0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6be0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6be0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 12.2.dhcpmon.exe.42d060c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 12.2.dhcpmon.exe.42d060c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 12.2.dhcpmon.exe.42d060c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6b90000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6b90000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6b90000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.3c70a26.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.3c70a26.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.3c70a26.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.2943c9c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.2943c9c.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.2943c9c.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6c40000.32.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6c40000.32.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6c40000.32.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6a10000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6a10000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6a10000.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.29ab8f8.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.29ab8f8.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.29ab8f8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6bd0000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6bd0000.28.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6bd0000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 12.2.dhcpmon.exe.32e9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 12.2.dhcpmon.exe.32e9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 12.2.dhcpmon.exe.32e9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.3c625f6.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.3c625f6.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.3c625f6.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.3c70a26.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.3c70a26.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.3c70a26.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6ba0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6ba0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6ba0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6b70000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6b70000.23.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6b70000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.390e5cf.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.390e5cf.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.390e5cf.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6350000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6350000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6350000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6b90000.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6b90000.25.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6b90000.25.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.39181d4.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.39181d4.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.39181d4.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.3a9adfd.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.3a9adfd.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.3a9adfd.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 12.2.dhcpmon.exe.42d4c35.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 12.2.dhcpmon.exe.42d4c35.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 12.2.dhcpmon.exe.42d4c35.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6350000.19.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6350000.19.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6350000.19.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.51b0000.18.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.51b0000.18.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.51b0000.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6360000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6360000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6360000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6b60000.22.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6b60000.22.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6b60000.22.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.SAaX2wNRn2.exe.37b0188.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 0.2.SAaX2wNRn2.exe.37b0188.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.SAaX2wNRn2.exe.37b0188.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.SAaX2wNRn2.exe.37b0188.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6ba0000.26.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6ba0000.26.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6ba0000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.6bd0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.6bd0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.6bd0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.2991884.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.2991884.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.2991884.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.SAaX2wNRn2.exe.2991884.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.29a5ec0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.29a5ec0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.29a5ec0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.SAaX2wNRn2.exe.29a5ec0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.29ab8f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 1.2.SAaX2wNRn2.exe.29ab8f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.29ab8f8.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.SAaX2wNRn2.exe.29ab8f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.3a8ebc9.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.3a8ebc9.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.SAaX2wNRn2.exe.3a8ebc9.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.SAaX2wNRn2.exe.39052f0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 0.2.SAaX2wNRn2.exe.39052f0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.SAaX2wNRn2.exe.39052f0.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.SAaX2wNRn2.exe.39052f0.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.3aaf42a.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.3aaf42a.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.SAaX2wNRn2.exe.3aaf42a.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0.2.SAaX2wNRn2.exe.37b0188.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 0.2.SAaX2wNRn2.exe.37b0188.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 0.2.SAaX2wNRn2.exe.37b0188.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.SAaX2wNRn2.exe.37b0188.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 1.2.SAaX2wNRn2.exe.3a9adfd.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
Source: 1.2.SAaX2wNRn2.exe.3a9adfd.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 1.2.SAaX2wNRn2.exe.3a9adfd.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.684510708.0000000006B60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000001.00000002.684510708.0000000006B60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.684510708.0000000006B60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.684765718.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000001.00000002.684765718.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.684765718.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.681445042.0000000004FA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000001.00000002.681445042.0000000004FA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.681445042.0000000004FA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.684858574.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000001.00000002.684858574.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.684858574.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000C.00000002.463275758.00000000042F6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000E.00000002.450850684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 0000000E.00000002.450850684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000E.00000002.450850684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.684333491.0000000006A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000001.00000002.684333491.0000000006A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.684333491.0000000006A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000C.00000002.463275758.0000000004289000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.683574588.0000000006360000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000001.00000002.683574588.0000000006360000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.683574588.0000000006360000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.672248267.0000000003901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.684621973.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000001.00000002.684621973.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.684621973.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.685185862.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000001.00000002.685185862.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.685185862.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.683481713.0000000006350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000001.00000002.683481713.0000000006350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.683481713.0000000006350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.684687442.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000001.00000002.684687442.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.684687442.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000C.00000002.458436332.0000000003281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000C.00000002.458436332.0000000003281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 0000000E.00000002.462495853.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000E.00000002.462495853.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.660971375.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000001.00000002.660971375.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000000.00000002.396639113.0000000003771000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000000.00000002.396639113.0000000003771000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.396639113.0000000003771000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.684948679.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000001.00000002.684948679.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.684948679.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.685278523.0000000006BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000001.00000002.685278523.0000000006BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.685278523.0000000006BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.685898407.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000001.00000002.685898407.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
Source: 00000001.00000002.685898407.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000003.404728224.0000000000B2A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000000.00000002.396639113.000000000438A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: 00000000.00000002.396639113.000000000438A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.396639113.000000000438A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: SAaX2wNRn2.exe PID: 2888, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: SAaX2wNRn2.exe PID: 2888, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: dhcpmon.exe PID: 5788, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: dhcpmon.exe PID: 5788, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: Process Memory Space: SAaX2wNRn2.exe PID: 6840, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
Source: Process Memory Space: SAaX2wNRn2.exe PID: 6840, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: SAaX2wNRn2.exe PID: 6840, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
Source: SAaX2wNRn2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 1.2.SAaX2wNRn2.exe.3c597c7.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3c597c7.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3c597c7.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.3c597c7.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6bb0000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6bb0000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6bb0000.27.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6bb0000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 12.2.dhcpmon.exe.42e95f8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 12.2.dhcpmon.exe.42e95f8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 12.2.dhcpmon.exe.42e95f8.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 12.2.dhcpmon.exe.42e95f8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6c40000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6c40000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6c40000.32.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6c40000.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6360000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6360000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6360000.20.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6360000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 12.2.dhcpmon.exe.42d060c.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 12.2.dhcpmon.exe.42d060c.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 12.2.dhcpmon.exe.42d060c.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 12.2.dhcpmon.exe.42d060c.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6bb0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6bb0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6bb0000.27.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6bb0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.51b0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.51b0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.51b0000.18.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.51b0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.3909930.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3909930.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3909930.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.3909930.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6be0000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6be0000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6be0000.31.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6be0000.31.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.3909930.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3909930.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3909930.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.3909930.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.SAaX2wNRn2.exe.438a808.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.SAaX2wNRn2.exe.438a808.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6b60000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6b60000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6b60000.22.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6b60000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.SAaX2wNRn2.exe.438a808.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.SAaX2wNRn2.exe.438a808.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.SAaX2wNRn2.exe.438a808.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.2943c9c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.2943c9c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.2943c9c.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.2943c9c.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.4fa0000.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.4fa0000.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.4fa0000.15.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.4fa0000.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.3a8ebc9.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3a8ebc9.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3a8ebc9.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.3a8ebc9.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.51b4629.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.51b4629.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.51b4629.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.51b4629.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6b70000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6b70000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6b70000.23.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6b70000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6bee8a4.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6bee8a4.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6bee8a4.30.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6bee8a4.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.3c625f6.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3c625f6.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3c625f6.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.3c625f6.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.29339c4.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.29339c4.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.29339c4.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.29339c4.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.SAaX2wNRn2.exe.29339c4.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6b80000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6b80000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6b80000.24.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6b80000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.SAaX2wNRn2.exe.3940518.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.SAaX2wNRn2.exe.3940518.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.SAaX2wNRn2.exe.3940518.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.SAaX2wNRn2.exe.3940518.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.3c597c7.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3c597c7.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3c597c7.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.3c597c7.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.SAaX2wNRn2.exe.3c597c7.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6be4c9f.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6be4c9f.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6be4c9f.29.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6be4c9f.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.2991884.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.2991884.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 14.2.SAaX2wNRn2.exe.30f9550.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 14.2.SAaX2wNRn2.exe.30f9550.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.2991884.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.2991884.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 14.2.SAaX2wNRn2.exe.30f9550.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 14.2.SAaX2wNRn2.exe.30f9550.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 12.2.dhcpmon.exe.42cb7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 12.2.dhcpmon.exe.42cb7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 12.2.dhcpmon.exe.42cb7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 12.2.dhcpmon.exe.42cb7d6.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6be0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6be0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6be0000.31.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6be0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 12.2.dhcpmon.exe.42d060c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 12.2.dhcpmon.exe.42d060c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 12.2.dhcpmon.exe.42d060c.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 12.2.dhcpmon.exe.42d060c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6b90000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6b90000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6b90000.25.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6b90000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.3c70a26.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3c70a26.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3c70a26.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.3c70a26.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.2943c9c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.2943c9c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.2943c9c.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.2943c9c.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6c40000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6c40000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6c40000.32.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6c40000.32.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6a10000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6a10000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6a10000.21.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6a10000.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.29ab8f8.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.29ab8f8.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.29ab8f8.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.29ab8f8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6bd0000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6bd0000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6bd0000.28.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6bd0000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 12.2.dhcpmon.exe.32e9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 12.2.dhcpmon.exe.32e9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 12.2.dhcpmon.exe.32e9658.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 12.2.dhcpmon.exe.32e9658.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.3c625f6.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3c625f6.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3c625f6.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.3c625f6.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.3c70a26.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3c70a26.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3c70a26.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.3c70a26.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6ba0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6ba0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6ba0000.26.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6ba0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6b70000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6b70000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6b70000.23.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6b70000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.390e5cf.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.390e5cf.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.390e5cf.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.390e5cf.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6350000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6350000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6350000.19.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6350000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6b90000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6b90000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6b90000.25.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6b90000.25.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.39181d4.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.39181d4.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.39181d4.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.39181d4.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.3a9adfd.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3a9adfd.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.3a9adfd.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.3a9adfd.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 12.2.dhcpmon.exe.42d4c35.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 12.2.dhcpmon.exe.42d4c35.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 12.2.dhcpmon.exe.42d4c35.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 12.2.dhcpmon.exe.42d4c35.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6350000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6350000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6350000.19.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6350000.19.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.51b0000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.51b0000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.51b0000.18.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.51b0000.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6360000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6360000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6360000.20.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6360000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6b60000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6b60000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6b60000.22.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6b60000.22.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.SAaX2wNRn2.exe.37b0188.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.SAaX2wNRn2.exe.37b0188.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.SAaX2wNRn2.exe.37b0188.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.SAaX2wNRn2.exe.37b0188.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.SAaX2wNRn2.exe.37b0188.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6ba0000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6ba0000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6ba0000.26.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6ba0000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.6bd0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6bd0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.6bd0000.28.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.6bd0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.2991884.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.2991884.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.2991884.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.SAaX2wNRn2.exe.2991884.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.29a5ec0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.29a5ec0.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.29a5ec0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.SAaX2wNRn2.exe.29a5ec0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.29ab8f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 1.2.SAaX2wNRn2.exe.29ab8f8.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.29ab8f8.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.SAaX2wNRn2.exe.29ab8f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.3a8ebc9.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.3a8ebc9.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.SAaX2wNRn2.exe.3a8ebc9.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.SAaX2wNRn2.exe.39052f0.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.SAaX2wNRn2.exe.39052f0.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.SAaX2wNRn2.exe.39052f0.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.SAaX2wNRn2.exe.39052f0.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.3aaf42a.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.3aaf42a.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.SAaX2wNRn2.exe.3aaf42a.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0.2.SAaX2wNRn2.exe.37b0188.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0.2.SAaX2wNRn2.exe.37b0188.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 0.2.SAaX2wNRn2.exe.37b0188.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.SAaX2wNRn2.exe.37b0188.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 1.2.SAaX2wNRn2.exe.3a9adfd.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 1.2.SAaX2wNRn2.exe.3a9adfd.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 1.2.SAaX2wNRn2.exe.3a9adfd.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.684510708.0000000006B60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.684510708.0000000006B60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.684510708.0000000006B60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.684510708.0000000006B60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.684765718.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.684765718.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.684765718.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.684765718.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.681445042.0000000004FA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.681445042.0000000004FA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.681445042.0000000004FA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.681445042.0000000004FA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.684858574.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.684858574.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.684858574.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.684858574.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000C.00000002.463275758.00000000042F6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000E.00000002.450850684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 0000000E.00000002.450850684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000E.00000002.450850684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.684333491.0000000006A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.684333491.0000000006A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.684333491.0000000006A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.684333491.0000000006A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000C.00000002.463275758.0000000004289000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.683574588.0000000006360000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.683574588.0000000006360000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.683574588.0000000006360000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.683574588.0000000006360000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.672248267.0000000003901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.684621973.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.684621973.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.684621973.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.684621973.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.685185862.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.685185862.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.685185862.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.685185862.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.683481713.0000000006350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.683481713.0000000006350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.683481713.0000000006350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.683481713.0000000006350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.684687442.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.684687442.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.684687442.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.684687442.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000C.00000002.458436332.0000000003281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000C.00000002.458436332.0000000003281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 0000000E.00000002.462495853.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000E.00000002.462495853.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.660971375.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000001.00000002.660971375.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000000.00000002.396639113.0000000003771000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.396639113.0000000003771000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.396639113.0000000003771000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.684948679.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.684948679.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.684948679.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.684948679.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.685278523.0000000006BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.685278523.0000000006BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.685278523.0000000006BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.685278523.0000000006BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.685898407.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.685898407.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000001.00000002.685898407.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
Source: 00000001.00000002.685898407.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000003.404728224.0000000000B2A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000000.00000002.396639113.000000000438A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.396639113.000000000438A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.396639113.000000000438A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: SAaX2wNRn2.exe PID: 2888, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: SAaX2wNRn2.exe PID: 2888, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: dhcpmon.exe PID: 5788, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: dhcpmon.exe PID: 5788, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: Process Memory Space: SAaX2wNRn2.exe PID: 6840, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: Process Memory Space: SAaX2wNRn2.exe PID: 6840, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: SAaX2wNRn2.exe PID: 6840, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeCode function: 0_2_00D8C1A40_2_00D8C1A4
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeCode function: 0_2_00D8E5F00_2_00D8E5F0
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeCode function: 0_2_04CA4AE80_2_04CA4AE8
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeCode function: 0_2_04CA4AE70_2_04CA4AE7
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeCode function: 0_2_04CAEA400_2_04CAEA40
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeCode function: 0_2_04CAEA500_2_04CAEA50
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeCode function: 1_2_06C538281_2_06C53828
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeCode function: 1_2_06C446D31_2_06C446D3
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeCode function: 1_2_06C442EB1_2_06C442EB
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeCode function: 1_2_06C433241_2_06C43324
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeCode function: 1_2_00F5E4801_2_00F5E480
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeCode function: 1_2_00F5E4711_2_00F5E471
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeCode function: 1_2_00F5BBD41_2_00F5BBD4
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeCode function: 1_2_04EAF5F81_2_04EAF5F8
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeCode function: 1_2_04EA97881_2_04EA9788
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeCode function: 1_2_04EAA5D01_2_04EAA5D0
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeCode function: 1_2_04EAA6101_2_04EAA610
Source: SAaX2wNRn2.exe, 00000000.00000002.401682391.00000000051D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000000.00000000.386381979.0000000000312000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameqiVgpo.exe8 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000000.00000002.394261730.0000000000AD9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.684510708.0000000006B60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.684765718.0000000006B90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.681445042.0000000004FA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.684858574.0000000006BA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.655815476.0000000000A88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameqiVgpo.exe8 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002901000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002901000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.685898407.0000000006C4E000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.684333491.0000000006A10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.683574588.0000000006360000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.685185862.0000000006BD8000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.681690461.00000000051A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003901000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003901000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003901000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.684621973.0000000006B70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.683481713.0000000006350000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.684687442.0000000006B80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.685278523.0000000006C08000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.655815476.0000000000A40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.684948679.0000000006BB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.685278523.0000000006BE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.685278523.0000000006BE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003981000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000001.00000003.404728224.0000000000B2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000006.00000002.421461459.000000000123A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000006.00000002.432766453.0000000004220000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 00000006.00000002.432766453.00000000042C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 0000000E.00000002.463953502.0000000004111000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 0000000E.00000002.462495853.0000000003091000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 0000000E.00000002.462495853.0000000003091000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exe, 0000000E.00000002.452148697.000000000110A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exeBinary or memory string: OriginalFilenameqiVgpo.exe8 vs SAaX2wNRn2.exe
Source: SAaX2wNRn2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: dhcpmon.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: SAaX2wNRn2.exeReversingLabs: Detection: 37%
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeFile read: C:\Users\user\Desktop\SAaX2wNRn2.exeJump to behavior
Source: SAaX2wNRn2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SAaX2wNRn2.exe C:\Users\user\Desktop\SAaX2wNRn2.exe
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess created: C:\Users\user\Desktop\SAaX2wNRn2.exe C:\Users\user\Desktop\SAaX2wNRn2.exe
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp1C83.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp1E68.tmp
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\user\Desktop\SAaX2wNRn2.exe C:\Users\user\Desktop\SAaX2wNRn2.exe 0
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess created: C:\Users\user\Desktop\SAaX2wNRn2.exe C:\Users\user\Desktop\SAaX2wNRn2.exe
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess created: C:\Users\user\Desktop\SAaX2wNRn2.exe C:\Users\user\Desktop\SAaX2wNRn2.exe
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess created: C:\Users\user\Desktop\SAaX2wNRn2.exe C:\Users\user\Desktop\SAaX2wNRn2.exe
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess created: C:\Users\user\Desktop\SAaX2wNRn2.exe C:\Users\user\Desktop\SAaX2wNRn2.exeJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp1C83.tmpJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp1E68.tmpJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess created: C:\Users\user\Desktop\SAaX2wNRn2.exe C:\Users\user\Desktop\SAaX2wNRn2.exeJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess created: C:\Users\user\Desktop\SAaX2wNRn2.exe C:\Users\user\Desktop\SAaX2wNRn2.exeJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess created: C:\Users\user\Desktop\SAaX2wNRn2.exe C:\Users\user\Desktop\SAaX2wNRn2.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SAaX2wNRn2.exe.logJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeFile created: C:\Users\user\AppData\Local\Temp\tmp1C83.tmpJump to behavior
Source: classification engineClassification label: mal100.troj.evad.winEXE@24/11@17/1
Source: SAaX2wNRn2.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{540c4d56-ad4d-4ca4-9f9f-305dba1da640}
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4048:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:760:120:WilError_01
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
Source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
Source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: SAaX2wNRn2.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SAaX2wNRn2.exeStatic file information: File size 1107968 > 1048576
Source: SAaX2wNRn2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: SAaX2wNRn2.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x10de00
Source: SAaX2wNRn2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: SAaX2wNRn2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: qiVgpo.pdbSHA256 source: SAaX2wNRn2.exe, dhcpmon.exe.1.dr
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: SAaX2wNRn2.exe, 00000001.00000002.684510708.0000000006B60000.00000004.08000000.00040000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.684858574.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.684687442.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: qiVgpo.pdb source: SAaX2wNRn2.exe, dhcpmon.exe.1.dr
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.684333491.0000000006A10000.00000004.08000000.00040000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.684765718.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.684621973.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: SAaX2wNRn2.exe, FormPortal.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
Source: 0.0.SAaX2wNRn2.exe.310000.0.unpack, FormPortal.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
Source: dhcpmon.exe.1.dr, FormPortal.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
Source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeCode function: 1_2_04EA69F8 pushad ; retf 1_2_04EA69F9
Source: SAaX2wNRn2.exeStatic PE information: 0xA87E36FB [Thu Jul 31 02:24:59 2059 UTC]
Source: initial sampleStatic PE information: section name: .text entropy: 7.686102487900815
Source: initial sampleStatic PE information: section name: .text entropy: 7.686102487900815
Source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp1C83.tmp

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeFile opened: C:\Users\user\Desktop\SAaX2wNRn2.exe:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\SAaX2wNRn2.exe TID: 5536Thread sleep time: -41202s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exe TID: 5544Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exe TID: 4592Thread sleep time: -4611686018427385s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exe TID: 4444Thread sleep time: -41202s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exe TID: 6988Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3608Thread sleep time: -41202s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5888Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6124Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exe TID: 6996Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5248Thread sleep time: -41202s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4048Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1576Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWindow / User API: threadDelayed 9480Jump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWindow / User API: foregroundWindowGot 743Jump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWindow / User API: foregroundWindowGot 634Jump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeThread delayed: delay time: 41202Jump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeThread delayed: delay time: 41202Jump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 41202Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 41202Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: SAaX2wNRn2.exe, 00000000.00000002.401682391.00000000051D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: tQiPvyHgFswpc9iUgCg
Source: SAaX2wNRn2.exe, 00000001.00000002.655815476.0000000000AFD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllP%u`
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess token adjusted: DebugJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeMemory written: C:\Users\user\Desktop\SAaX2wNRn2.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess created: C:\Users\user\Desktop\SAaX2wNRn2.exe C:\Users\user\Desktop\SAaX2wNRn2.exeJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp1C83.tmpJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp1E68.tmpJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess created: C:\Users\user\Desktop\SAaX2wNRn2.exe C:\Users\user\Desktop\SAaX2wNRn2.exeJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess created: C:\Users\user\Desktop\SAaX2wNRn2.exe C:\Users\user\Desktop\SAaX2wNRn2.exeJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeProcess created: C:\Users\user\Desktop\SAaX2wNRn2.exe C:\Users\user\Desktop\SAaX2wNRn2.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002D8A000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002EB6000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002EEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager(
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerD$FpI
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002D8A000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002EB6000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002C2A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: SAaX2wNRn2.exe, 00000001.00000002.686482545.0000000006EDC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002EEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager4
Source: SAaX2wNRn2.exe, 00000001.00000002.682673652.000000000600C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Users\user\Desktop\SAaX2wNRn2.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Users\user\Desktop\SAaX2wNRn2.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Users\user\Desktop\SAaX2wNRn2.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Users\user\Desktop\SAaX2wNRn2.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeCode function: 1_2_06C53168 GetSystemTimes,1_2_06C53168
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\SAaX2wNRn2.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

Stealing of Sensitive Information

barindex
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.51b0000.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.438a808.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.51b4629.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.3940518.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.51b0000.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.37b0188.8.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.3a8ebc9.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.39052f0.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.3aaf42a.14.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.37b0188.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.3a9adfd.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0000000E.00000002.450850684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000C.00000002.458436332.0000000003281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000E.00000002.462495853.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.660971375.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.396639113.0000000003771000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.396639113.000000000438A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: SAaX2wNRn2.exe PID: 2888, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5788, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: SAaX2wNRn2.exe PID: 6840, type: MEMORYSTR

Remote Access Functionality

barindex
Source: SAaX2wNRn2.exeString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000002.684510708.0000000006B60000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: SAaX2wNRn2.exe, 00000001.00000002.684765718.0000000006B90000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000002.681445042.0000000004FA0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000002.681445042.0000000004FA0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: SAaX2wNRn2.exe, 00000001.00000002.684858574.0000000006BA0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000002.684858574.0000000006BA0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: SAaX2wNRn2.exe, 00000001.00000002.684333491.0000000006A10000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000002.684333491.0000000006A10000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: SAaX2wNRn2.exe, 00000001.00000002.683574588.0000000006360000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000002.684621973.0000000006B70000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000002.684621973.0000000006B70000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: SAaX2wNRn2.exe, 00000001.00000002.685185862.0000000006BD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000002.683481713.0000000006350000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000002.684687442.0000000006B80000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000002.684687442.0000000006B80000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: SAaX2wNRn2.exe, 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000002.684948679.0000000006BB0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: SAaX2wNRn2.exe, 00000001.00000002.685278523.0000000006BE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000002.685898407.0000000006C40000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 00000001.00000003.404728224.0000000000B2A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 0000000C.00000002.458436332.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 0000000C.00000002.458436332.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: dhcpmon.exe, 0000000C.00000002.463275758.00000000042F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 0000000C.00000002.463275758.00000000042F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: HApplicationBaseMicrosoft.VisualBasic.ApplicationServicesUserConversionsMicrosoft.VisualBasic.CompilerServicesObjectFlowControlOperatorsProjectDataStandardModuleAttributeComputerMicrosoft.VisualBasic.DevicesHideModuleNameAttributeMyGroupCollectionAttributeContextValue`1Microsoft.VisualBasic.MyServices.InternalClientInvokeDelegateNanoCoreIClientDataNanoCore.ClientPluginIClientNetworkIClientDataHostNanoCore.ClientPluginHostIClientLoggingHostIClientNetworkHostIClientUIHostIClientNameObjectCollectionIClientReadOnlyNameObjectCollectionActivatorAppDomainArgumentOutOfRangeExceptionArrayAsyncCallbackBitConverterBooleanBufferByteCharCLSCompliantAttributeGeneratedCodeAttributeSystem.CodeDom.CompilerDictionary`2System.Collections.GenericEnumeratorIEnumerable`1KeyValuePair`2List`1IEnumeratorSystem.CollectionsEditorBrowsableAttributeSystem.ComponentModelEditorBrowsableStateApplicationSettingsBaseSystem.ConfigurationSettingsBaseDateTimeDateTimeKindDelegateDebuggerDis
Source: dhcpmon.exe, 0000000C.00000002.463275758.0000000004289000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: dhcpmon.exe, 0000000C.00000002.463275758.0000000004289000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: dhcpmon.exe, 0000000C.00000002.463275758.0000000004289000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: HApplicationBaseMicrosoft.VisualBasic.ApplicationServicesUserConversionsMicrosoft.VisualBasic.CompilerServicesObjectFlowControlOperatorsProjectDataStandardModuleAttributeComputerMicrosoft.VisualBasic.DevicesHideModuleNameAttributeMyGroupCollectionAttributeContextValue`1Microsoft.VisualBasic.MyServices.InternalClientInvokeDelegateNanoCoreIClientDataNanoCore.ClientPluginIClientNetworkIClientDataHostNanoCore.ClientPluginHostIClientLoggingHostIClientNetworkHostIClientUIHostIClientNameObjectCollectionIClientReadOnlyNameObjectCollectionActivatorAppDomainArgumentOutOfRangeExceptionArrayAsyncCallbackBitConverterBooleanBufferByteCharCLSCompliantAttributeGeneratedCodeAttributeSystem.CodeDom.CompilerDictionary`2System.Collections.GenericEnumeratorIEnumerable`1KeyValuePair`2List`1IEnumeratorSystem.CollectionsEditorBrowsableAttributeSystem.ComponentModelEditorBrowsableStateApplicationSettingsBaseSystem.ConfigurationSettingsBaseDateTimeDateTimeKind
Source: SAaX2wNRn2.exe, 0000000E.00000002.450850684.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 0000000E.00000002.462495853.0000000003091000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: SAaX2wNRn2.exe, 0000000E.00000002.462495853.0000000003091000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.51b0000.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.438a808.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 14.2.SAaX2wNRn2.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.51b4629.17.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.3940518.7.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.51b0000.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.37b0188.8.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.3a8ebc9.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.39052f0.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.3aaf42a.14.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.SAaX2wNRn2.exe.37b0188.8.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.SAaX2wNRn2.exe.3a9adfd.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0000000E.00000002.450850684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000C.00000002.458436332.0000000003281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000E.00000002.462495853.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.660971375.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.396639113.0000000003771000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.396639113.000000000438A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: SAaX2wNRn2.exe PID: 2888, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5788, type: MEMORYSTR
Source: Yara matchFile source: Process Memory Space: SAaX2wNRn2.exe PID: 6840, type: MEMORYSTR
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Windows Management Instrumentation
1
Scheduled Task/Job
112
Process Injection
2
Masquerading
21
Input Capture
1
System Time Discovery
Remote Services21
Input Capture
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Scheduled Task/Job
Boot or Logon Initialization Scripts1
Scheduled Task/Job
1
Disable or Modify Tools
LSASS Memory111
Security Software Discovery
Remote Desktop Protocol11
Archive Collected Data
Exfiltration Over Bluetooth1
Non-Standard Port
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
Virtualization/Sandbox Evasion
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Remote Access Software
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
Process Injection
NTDS21
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureScheduled Transfer1
Non-Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets1
Application Window Discovery
SSHKeyloggingData Transfer Size Limits21
Application Layer Protocol
Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
Hidden Files and Directories
Cached Domain Credentials13
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup Items2
Obfuscated Files or Information
DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job12
Software Packing
Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
Timestomp
/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 878777 Sample: SAaX2wNRn2.exe Startdate: 31/05/2023 Architecture: WINDOWS Score: 100 55 Snort IDS alert for network traffic 2->55 57 Found malware configuration 2->57 59 Malicious sample detected (through community Yara rule) 2->59 61 12 other signatures 2->61 8 SAaX2wNRn2.exe 3 2->8         started        12 dhcpmon.exe 3 2->12         started        14 SAaX2wNRn2.exe 2 2->14         started        16 dhcpmon.exe 2 2->16         started        process3 file4 51 C:\Users\user\AppData\...\SAaX2wNRn2.exe.log, ASCII 8->51 dropped 65 Uses schtasks.exe or at.exe to add and modify task schedules 8->65 67 Injects a PE file into a foreign processes 8->67 18 SAaX2wNRn2.exe 1 15 8->18         started        23 dhcpmon.exe 2 12->23         started        25 dhcpmon.exe 12->25         started        27 SAaX2wNRn2.exe 2 14->27         started        29 SAaX2wNRn2.exe 14->29         started        31 SAaX2wNRn2.exe 14->31         started        33 dhcpmon.exe 16->33         started        signatures5 process6 dnsIp7 53 jasonbourneblack.ddns.net 141.98.6.167, 4032, 49716, 49717 CMCSUS Germany 18->53 43 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->43 dropped 45 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 18->45 dropped 47 C:\Users\user\AppData\Local\...\tmp1C83.tmp, XML 18->47 dropped 49 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 18->49 dropped 63 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->63 35 schtasks.exe 1 18->35         started        37 schtasks.exe 1 18->37         started        file8 signatures9 process10 process11 39 conhost.exe 35->39         started        41 conhost.exe 37->41         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SAaX2wNRn2.exe38%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
SAaX2wNRn2.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe38%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
127.0.0.10%Avira URL Cloudsafe
jasonbourneblack.ddns.net100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
jasonbourneblack.ddns.net
141.98.6.167
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    jasonbourneblack.ddns.nettrue
    • Avira URL Cloud: malware
    unknown
    127.0.0.1true
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://google.comSAaX2wNRn2.exe, 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.684765718.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, SAaX2wNRn2.exe, 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSAaX2wNRn2.exe, 00000001.00000002.660971375.0000000002901000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        141.98.6.167
        jasonbourneblack.ddns.netGermany
        33657CMCSUStrue
        Joe Sandbox Version:37.1.0 Beryl
        Analysis ID:878777
        Start date and time:2023-05-31 07:51:06 +02:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 11m 20s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:18
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample file name:SAaX2wNRn2.exe
        Original Sample Name:e89323dd0063fb87b2115af014bbaf94.exe
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@24/11@17/1
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:Failed
        HCA Information:
        • Successful, ratio: 93%
        • Number of executed functions: 50
        • Number of non-executed functions: 4
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
        • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
        • Not all processes where analyzed, report is missing behavior information
        • Report creation exceeded maximum time and may have missing disassembly code information.
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
        • Report size getting too big, too many NtDeviceIoControlFile calls found.
        • VT rate limit hit for: SAaX2wNRn2.exe
        TimeTypeDescription
        07:52:05API Interceptor980x Sleep call for process: SAaX2wNRn2.exe modified
        07:52:08AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        07:52:10Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\SAaX2wNRn2.exe" s>$(Arg0)
        07:52:11Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
        07:52:14API Interceptor2x Sleep call for process: dhcpmon.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        141.98.6.1674An07Q7I8G.exeGet hashmaliciousNanocoreBrowse
          x4VGltSj0j.exeGet hashmaliciousNanocoreBrowse
            M8Hh0nRCxM.exeGet hashmaliciousNanocoreBrowse
              pQ8I1Q95pk.exeGet hashmaliciousNanocoreBrowse
                1UScideLXZ.exeGet hashmaliciousNanocoreBrowse
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  jasonbourneblack.ddns.net4An07Q7I8G.exeGet hashmaliciousNanocoreBrowse
                  • 141.98.6.167
                  x4VGltSj0j.exeGet hashmaliciousNanocoreBrowse
                  • 141.98.6.167
                  M8Hh0nRCxM.exeGet hashmaliciousNanocoreBrowse
                  • 141.98.6.167
                  pQ8I1Q95pk.exeGet hashmaliciousNanocoreBrowse
                  • 141.98.6.167
                  1UScideLXZ.exeGet hashmaliciousNanocoreBrowse
                  • 141.98.6.167
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  CMCSUSfile.exeGet hashmaliciousAmadey, Fabookie, PrivateLoader, RedLine, TofseeBrowse
                  • 85.208.136.10
                  ATA9cyC09S.exeGet hashmaliciousLokibotBrowse
                  • 171.22.30.164
                  xTsOPUeCOc.rtfGet hashmaliciousGuLoaderBrowse
                  • 45.66.230.128
                  Quotation Details.exeGet hashmaliciousNanocoreBrowse
                  • 45.12.253.242
                  m2uFAHJ8jm.exeGet hashmaliciousNymaimBrowse
                  • 45.12.253.56
                  F61T6QigJc.exeGet hashmaliciousNymaimBrowse
                  • 45.12.253.56
                  https://0831ww367.top/r2.php#M=suckit@suckit.comGet hashmaliciousHTMLPhisherBrowse
                  • 95.214.24.140
                  Shipping_Document_&_BL_Draft_copy.xlsGet hashmaliciousLokibotBrowse
                  • 171.22.30.164
                  AB7JQ1vKDq.exeGet hashmaliciousMinerDownloader, Nymaim, RedLine, Vidar, XmrigBrowse
                  • 45.12.253.56
                  Modis_list.xlsGet hashmaliciousRemcosBrowse
                  • 45.66.230.127
                  9s3YK7qgWI.exeGet hashmaliciousNymaimBrowse
                  • 45.12.253.56
                  7b35hyn484.exeGet hashmaliciousNymaimBrowse
                  • 45.12.253.56
                  https://sign-on-lmo.agile-workbench.com/?username=t.haus@asdk.comGet hashmaliciousHTMLPhisherBrowse
                  • 95.214.24.140
                  xPP4QxLkmgBB.exeGet hashmaliciousClipboard Hijacker, QuasarBrowse
                  • 95.214.27.180
                  4An07Q7I8G.exeGet hashmaliciousNanocoreBrowse
                  • 141.98.6.167
                  https://www.bing.com/ck/a?!&&p=79845ec745a4255fJmltdHM9MTY4NTE0NTYwMCZpZ3VpZD0yNDYzOTBhOS1kZDMyLTY1Y2ItMDM5ZC04M2I3ZGM1MDY0NzImaW5zaWQ9NTIwOQ&ptn=3&hsh=3&fclid=246390a9-dd32-65cb-039d-83b7dc506472&u=a1aHR0cHM6Ly9mdXJuaXphLmNvbS9wcm9kdWN0L2VsbGVuLXVwaG9sc3RlcmVkLXNjb29wZWQtYXJtLXNvZmEtd2l0aC1zcXVhcmUtdHVmdGluZy1icm9va3NpZGUtaG9tZS8#M=abuse@fbi.govGet hashmaliciousHTMLPhisherBrowse
                  • 95.214.24.140
                  RPxMx1uuBh.exeGet hashmaliciousNymaimBrowse
                  • 45.12.253.56
                  K0zAFb4x67.exeGet hashmaliciousNymaimBrowse
                  • 45.12.253.56
                  py75hHwvGP.exeGet hashmaliciousNymaimBrowse
                  • 45.12.253.56
                  0P1uXL1t2D.exeGet hashmaliciousNymaimBrowse
                  • 45.12.253.56
                  No context
                  No context
                  Process:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):1107968
                  Entropy (8bit):7.681342200669093
                  Encrypted:false
                  SSDEEP:24576:WkJLaVUH999a0EXC/swhOm5inc8NRLICAWVfjJGXQn+DxklRZ:BNBH9a0WImm5ic8TJlGAn+Fklb
                  MD5:E89323DD0063FB87B2115AF014BBAF94
                  SHA1:788E5FCAE9E19827A9E2A3238CF17C50A737D948
                  SHA-256:70D856CFC4E27C7CA18C939FD13FB989A308C64C0CD78D5D6F07759CC355C3DB
                  SHA-512:BD66EC1C94DA96F51FC4487DA13E77710FF0F1DADE38859BDF3F86F3D42BB8DC4E955D79E29273D3B555C6773D8C98676BD9A0F670345FD9D7EE6782F13867AA
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 38%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6~...............0.................. ........@.. .......................@............@.....................................O............................ ..........p............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................H....... I..............................................................0...........r...ps.........~.....+..*".(.....*..0..`........s....}......}.....(.............s....s......o......{....o......o..... ....(......(......o.....*6.sM...(.....*..*....0............~.....o ...o!......r"..p.o"....L...o#....L...o$......r0..p.o%....L...o#....L...o&......r<..p.o'....L...o#....L...o(......rF..p.o)....L...o#....L...o*.......&....*.................0..m........s+....+M...+3...o,...o-....
                  Process:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:true
                  Preview:[ZoneTransfer]....ZoneId=0
                  Process:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1216
                  Entropy (8bit):5.355304211458859
                  Encrypted:false
                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                  MD5:FED34146BF2F2FA59DCF8702FCC8232E
                  SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                  SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                  SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                  Malicious:true
                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                  Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1216
                  Entropy (8bit):5.355304211458859
                  Encrypted:false
                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                  MD5:FED34146BF2F2FA59DCF8702FCC8232E
                  SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                  SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                  SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                  Malicious:false
                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                  Process:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1301
                  Entropy (8bit):5.103160930415285
                  Encrypted:false
                  SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Pmlxtn:cbk4oL600QydbQxIYODOLedq3SQj
                  MD5:0F6280DDBDCD8BA3DD05C3A2B2830CE1
                  SHA1:54ADF97784C03D8E5F0E1495B0CB1AC7D682D0CA
                  SHA-256:E1F4397A5EBB7CC9AD989E0E5D4A2ABB8F4A58090E902B8E4A4B41AD8C921C1C
                  SHA-512:F80AEA64F216E3388DDD969917BC64B322DE1ED54EB8350A825CF0CA7B04DDB78C06B0391AD666D040A2CA4EBC512B67A4753B6FD875AB306E90DBB3E2F77045
                  Malicious:true
                  Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                  Process:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1310
                  Entropy (8bit):5.109425792877704
                  Encrypted:false
                  SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                  MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                  SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                  SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                  SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                  Process:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):232
                  Entropy (8bit):7.024371743172393
                  Encrypted:false
                  SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                  MD5:32D0AAE13696FF7F8AF33B2D22451028
                  SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                  SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                  SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                  Malicious:false
                  Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                  Process:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  File Type:Non-ISO extended-ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):8
                  Entropy (8bit):3.0
                  Encrypted:false
                  SSDEEP:3:K:K
                  MD5:CED92A1312CEBF2C089EECDAFE3BE2E4
                  SHA1:4688DB535ACE3DBE636AF7D01F850E91286E0044
                  SHA-256:E81032B5009AEBCC130758D8EFAFDD937ADCAC2900495E78DA0D8F7DB8835790
                  SHA-512:5002352CA33AF2559D3631D7B19C9871156812E274AB2DB77C8440747E0350A82686FE29AF4C14BA0BCD51775FA17C9BC8F8D9A4941E7585E8A81B1CA1732076
                  Malicious:true
                  Preview:>{...a.H
                  Process:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  File Type:data
                  Category:modified
                  Size (bytes):40
                  Entropy (8bit):5.153055907333276
                  Encrypted:false
                  SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                  MD5:4E5E92E2369688041CC82EF9650EDED2
                  SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                  SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                  SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                  Malicious:false
                  Preview:9iH...}Z.4..f.~a........~.~.......3.U.
                  Process:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):327432
                  Entropy (8bit):7.99938831605763
                  Encrypted:true
                  SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                  MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                  SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                  SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                  SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                  Malicious:false
                  Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                  Process:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):38
                  Entropy (8bit):4.405822250285692
                  Encrypted:false
                  SSDEEP:3:oNUWJRW2N1Sr7XJ:oNNJA2N1S3Z
                  MD5:C5309FC2F2D48EE1E1D12676BE13EE52
                  SHA1:C93663839AE1AA83A8D59A56E83839120C449C97
                  SHA-256:792F2B8B322E2CD8ABE3AE852092273883A7F6133A3FB0C0FBFD240EA809A624
                  SHA-512:13B00B680C2BBBA2791FAAD9D9BD420DA908BFCF6E331C3EC9C9272CE6AD858053331F6FF9869F8EE1B6244375844A4278F1139C9ED78897CA077B8CE8F7AAF8
                  Malicious:false
                  Preview:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):7.681342200669093
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  • Win32 Executable (generic) a (10002005/4) 49.78%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  • DOS Executable Generic (2002/1) 0.01%
                  File name:SAaX2wNRn2.exe
                  File size:1107968
                  MD5:e89323dd0063fb87b2115af014bbaf94
                  SHA1:788e5fcae9e19827a9e2a3238cf17c50a737d948
                  SHA256:70d856cfc4e27c7ca18c939fd13fb989a308c64c0cd78d5d6f07759cc355c3db
                  SHA512:bd66ec1c94da96f51fc4487da13e77710ff0f1dade38859bdf3f86f3d42bb8dc4e955d79e29273d3b555c6773d8c98676bd9a0f670345fd9d7ee6782f13867aa
                  SSDEEP:24576:WkJLaVUH999a0EXC/swhOm5inc8NRLICAWVfjJGXQn+DxklRZ:BNBH9a0WImm5ic8TJlGAn+Fklb
                  TLSH:1235F14463BB8F2BD47B57F24610623087FA6AA9347EE32A8ED261DF1575F404E01B1B
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6~...............0.................. ........@.. .......................@............@................................
                  Icon Hash:90cececece8e8eb0
                  Entrypoint:0x50fce6
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0xA87E36FB [Thu Jul 31 02:24:59 2059 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x10fc940x4f.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1100000x5d0.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1120000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x10c0e40x70.text
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000x10dcec0x10de00False0.8788990128531727data7.686102487900815IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rsrc0x1100000x5d00x600False0.4322916666666667data4.146225266616758IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x1120000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountry
                  RT_VERSION0x1100900x340data
                  RT_MANIFEST0x1103e00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                  DLLImport
                  mscoree.dll_CorExeMain
                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  192.168.2.5141.98.6.1674972340322816766 05/31/23-07:53:03.283583TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497234032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674971640322816766 05/31/23-07:52:13.461105TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497164032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674971840322025019 05/31/23-07:52:31.617417TCP2025019ET TROJAN Possible NanoCore C2 60B497184032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674972840322025019 05/31/23-07:53:33.869411TCP2025019ET TROJAN Possible NanoCore C2 60B497284032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674972940322816766 05/31/23-07:53:43.288922TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497294032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674973340322816766 05/31/23-07:54:08.525317TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497334032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674973240322025019 05/31/23-07:54:01.126019TCP2025019ET TROJAN Possible NanoCore C2 60B497324032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674971940322816766 05/31/23-07:52:40.572861TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497194032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674971940322025019 05/31/23-07:52:39.496237TCP2025019ET TROJAN Possible NanoCore C2 60B497194032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674972240322025019 05/31/23-07:52:54.172177TCP2025019ET TROJAN Possible NanoCore C2 60B497224032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674973040322816766 05/31/23-07:53:49.430104TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497304032192.168.2.5141.98.6.167
                  141.98.6.167192.168.2.54032497182810290 05/31/23-07:52:32.211435TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 1403249718141.98.6.167192.168.2.5
                  192.168.2.5141.98.6.1674973240322816718 05/31/23-07:54:02.704983TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497324032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674971640322025019 05/31/23-07:52:11.267334TCP2025019ET TROJAN Possible NanoCore C2 60B497164032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674972040322816766 05/31/23-07:52:48.788255TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497204032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674972440322816766 05/31/23-07:53:09.525595TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497244032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674972540322025019 05/31/23-07:53:15.239239TCP2025019ET TROJAN Possible NanoCore C2 60B497254032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674973140322025019 05/31/23-07:53:54.566547TCP2025019ET TROJAN Possible NanoCore C2 60B497314032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674972940322025019 05/31/23-07:53:42.302533TCP2025019ET TROJAN Possible NanoCore C2 60B497294032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674973140322816766 05/31/23-07:53:56.008756TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497314032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674971840322816766 05/31/23-07:52:32.730530TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497184032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674972840322816766 05/31/23-07:53:36.859358TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497284032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674972340322025019 05/31/23-07:53:02.033758TCP2025019ET TROJAN Possible NanoCore C2 60B497234032192.168.2.5141.98.6.167
                  141.98.6.167192.168.2.54032497332841753 05/31/23-07:54:23.318530TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)403249733141.98.6.167192.168.2.5
                  192.168.2.5141.98.6.1674972040322025019 05/31/23-07:52:47.324081TCP2025019ET TROJAN Possible NanoCore C2 60B497204032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674972640322025019 05/31/23-07:53:20.721069TCP2025019ET TROJAN Possible NanoCore C2 60B497264032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674973040322025019 05/31/23-07:53:48.374058TCP2025019ET TROJAN Possible NanoCore C2 60B497304032192.168.2.5141.98.6.167
                  141.98.6.167192.168.2.54032497252841753 05/31/23-07:53:15.269919TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)403249725141.98.6.167192.168.2.5
                  141.98.6.167192.168.2.54032497172841753 05/31/23-07:52:25.058340TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)403249717141.98.6.167192.168.2.5
                  192.168.2.5141.98.6.1674972240322816766 05/31/23-07:52:55.998811TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497224032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674972440322025019 05/31/23-07:53:08.375676TCP2025019ET TROJAN Possible NanoCore C2 60B497244032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674972740322816766 05/31/23-07:53:28.901780TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497274032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674971740322816766 05/31/23-07:52:22.187780TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497174032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674971740322025019 05/31/23-07:52:20.026839TCP2025019ET TROJAN Possible NanoCore C2 60B497174032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674972640322816766 05/31/23-07:53:21.715954TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497264032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674972040322816718 05/31/23-07:52:47.571898TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497204032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674973240322816766 05/31/23-07:54:02.704983TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497324032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674972740322025019 05/31/23-07:53:27.404072TCP2025019ET TROJAN Possible NanoCore C2 60B497274032192.168.2.5141.98.6.167
                  192.168.2.5141.98.6.1674973340322025019 05/31/23-07:54:08.288405TCP2025019ET TROJAN Possible NanoCore C2 60B497334032192.168.2.5141.98.6.167
                  TimestampSource PortDest PortSource IPDest IP
                  May 31, 2023 07:52:11.139539957 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.166393995 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.166547060 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.267333984 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.344276905 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.344360113 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.378912926 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.397016048 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.425708055 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.473263979 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.494035959 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.577244043 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.680847883 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.680958986 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.680986881 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.681005955 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.681045055 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.681086063 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.708596945 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.708760023 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.708786964 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.708810091 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.708836079 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.708858013 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.708863974 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.708882093 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.708906889 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.708911896 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.708911896 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.710009098 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.739830017 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.739860058 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.739896059 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.739939928 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.739964008 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.739985943 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.740015984 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.740016937 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.740040064 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.740063906 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.740067959 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.740086079 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.740092993 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.740118980 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.740143061 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.740156889 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.740175962 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.740181923 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.740204096 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.740227938 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.740242004 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.740253925 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.743238926 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.766690969 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.766854048 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.766884089 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.766913891 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.766921997 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.766946077 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.766971111 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.766983986 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767015934 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767040014 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767040968 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.767071009 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767076969 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.767098904 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767122984 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767146111 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767165899 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.767168999 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767193079 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.767195940 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767220020 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767244101 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767261982 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.767268896 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767285109 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.767293930 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767318010 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767339945 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767359972 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.767363071 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767384052 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.767390013 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767415047 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767436981 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767460108 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767467022 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.767482996 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767493963 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.767508030 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767530918 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.767551899 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.767571926 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.769560099 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.769594908 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.769618034 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.769642115 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.769712925 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.793961048 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794003963 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794038057 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794061899 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794091940 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794110060 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.794127941 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794154882 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794162989 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.794182062 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794198990 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.794203997 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794228077 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794246912 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794266939 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794296026 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794332981 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.794333935 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794368982 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794377089 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.794390917 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.794408083 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794442892 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794476032 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794486046 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.794509888 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794512987 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.794552088 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794584036 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794594049 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.794615030 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794646978 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794677973 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794691086 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.794707060 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794718981 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.794735909 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794763088 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794791937 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794816971 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.794817924 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794843912 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.794848919 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794877052 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794903994 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794915915 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.794931889 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794958115 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.794959068 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794989109 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.794995070 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.795017958 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.795046091 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.795072079 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.795074940 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.795101881 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.795121908 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.795130968 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.795160055 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.795186043 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.795197964 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.795216084 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.795237064 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.795244932 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.795273066 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.795299053 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.795315027 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.795326948 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.795331955 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.796063900 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.796139002 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.796243906 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.796279907 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.796309948 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.796320915 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.822050095 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822098970 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822129965 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822169065 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822171926 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.822202921 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822222948 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.822237968 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822242022 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.822272062 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822330952 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822365046 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822370052 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.822398901 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822408915 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.822433949 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822465897 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822482109 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.822500944 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822532892 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822542906 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.822566032 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822597980 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822602987 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.822630882 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822662115 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822670937 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.822695971 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822729111 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822731972 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.822762012 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822793961 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822823048 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822848082 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.822859049 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822860956 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.822894096 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822926044 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822932959 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.822958946 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822990894 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.822997093 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.823024035 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823055029 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823067904 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.823088884 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823121071 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823152065 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823158979 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.823185921 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823218107 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823232889 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.823250055 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.823251963 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823285103 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823317051 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823348999 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823357105 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.823380947 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823390961 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.823415041 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823446035 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823477983 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823486090 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.823512077 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823515892 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.823545933 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823579073 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823610067 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823622942 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.823642969 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.823657990 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.823677063 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.824024916 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.838021994 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.850635052 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.850680113 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.850713015 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.850743055 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.850774050 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.850781918 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.850806952 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.850820065 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.850842953 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.850855112 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.850884914 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.850915909 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.850950956 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.850974083 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.850982904 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.850995064 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.851020098 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851052999 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851083040 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851097107 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.851115942 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851125956 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.851154089 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851188898 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851219893 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851233959 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.851250887 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851263046 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.851284981 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851316929 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851346016 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851356983 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.851377964 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851383924 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.851411104 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851442099 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851471901 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851480961 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.851502895 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851512909 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.851537943 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851568937 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851582050 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.851607084 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851639032 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851669073 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851696968 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.851699114 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851732016 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.851732016 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851766109 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851772070 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.851799965 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851830006 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851840019 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.851865053 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851896048 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851926088 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851933002 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.851958990 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.851963997 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.851990938 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.852021933 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.852068901 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.864640951 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.864682913 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.864715099 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.864746094 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.864749908 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.864777088 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.864801884 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.864809990 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.864820004 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.864845037 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.865889072 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.879049063 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879092932 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879129887 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879139900 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.879163980 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879199028 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879216909 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.879231930 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879266024 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879273891 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.879300117 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879331112 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879350901 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.879364014 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879396915 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879404068 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.879431009 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879463911 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879496098 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879504919 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.879529953 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879534960 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.879565001 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879596949 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879630089 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879636049 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.879662991 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879668951 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.879698038 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879730940 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879743099 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.879765034 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879797935 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879827976 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879836082 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.879863977 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879868031 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.879897118 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879930019 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879960060 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.879976988 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.879993916 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880007029 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.880028009 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880059004 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880069017 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.880090952 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880122900 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880153894 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880165100 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.880187035 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880191088 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.880222082 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880253077 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880275965 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.880301952 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880333900 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880342007 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.880367041 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880399942 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880431890 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880441904 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.880465031 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880476952 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.880498886 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880530119 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880537987 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.880563974 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880597115 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880604982 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.880629063 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880662918 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880688906 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.880696058 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880728006 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880758047 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880772114 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.880790949 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880799055 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.880825043 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880856037 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880887985 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880897999 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.880920887 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880923033 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.880954981 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.880985975 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.881016016 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.881023884 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.881052971 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.881084919 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.881094933 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.881115913 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.881122112 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.881150007 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.881185055 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.881222010 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.881238937 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.881253004 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.881268024 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:11.881285906 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.881319046 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:11.881359100 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:12.749237061 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:12.827205896 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:13.461105108 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:13.544223070 CEST403249716141.98.6.167192.168.2.5
                  May 31, 2023 07:52:14.442074060 CEST497164032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:19.998701096 CEST497174032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:20.025597095 CEST403249717141.98.6.167192.168.2.5
                  May 31, 2023 07:52:20.025718927 CEST497174032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:20.026839018 CEST497174032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:20.103079081 CEST403249717141.98.6.167192.168.2.5
                  May 31, 2023 07:52:20.174779892 CEST403249717141.98.6.167192.168.2.5
                  May 31, 2023 07:52:20.175062895 CEST497174032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:20.205766916 CEST403249717141.98.6.167192.168.2.5
                  May 31, 2023 07:52:20.274163961 CEST497174032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:20.355335951 CEST403249717141.98.6.167192.168.2.5
                  May 31, 2023 07:52:20.548919916 CEST403249717141.98.6.167192.168.2.5
                  May 31, 2023 07:52:20.599009991 CEST497174032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:20.625313044 CEST403249717141.98.6.167192.168.2.5
                  May 31, 2023 07:52:20.708436012 CEST497174032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:21.423294067 CEST497174032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:21.502283096 CEST403249717141.98.6.167192.168.2.5
                  May 31, 2023 07:52:22.102485895 CEST497174032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:22.187671900 CEST403249717141.98.6.167192.168.2.5
                  May 31, 2023 07:52:22.187779903 CEST497174032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:22.265212059 CEST403249717141.98.6.167192.168.2.5
                  May 31, 2023 07:52:22.590559006 CEST497174032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:22.617264032 CEST403249717141.98.6.167192.168.2.5
                  May 31, 2023 07:52:22.728898048 CEST497174032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:22.797563076 CEST497174032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:22.825069904 CEST403249717141.98.6.167192.168.2.5
                  May 31, 2023 07:52:22.911669970 CEST497174032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:22.940536022 CEST403249717141.98.6.167192.168.2.5
                  May 31, 2023 07:52:23.106256962 CEST497174032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:25.058340073 CEST403249717141.98.6.167192.168.2.5
                  May 31, 2023 07:52:25.115008116 CEST497174032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:25.654189110 CEST497174032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:31.590605974 CEST497184032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:31.616736889 CEST403249718141.98.6.167192.168.2.5
                  May 31, 2023 07:52:31.616852999 CEST497184032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:31.617417097 CEST497184032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:31.693842888 CEST403249718141.98.6.167192.168.2.5
                  May 31, 2023 07:52:31.693965912 CEST497184032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:31.753282070 CEST403249718141.98.6.167192.168.2.5
                  May 31, 2023 07:52:31.753534079 CEST497184032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:31.780795097 CEST403249718141.98.6.167192.168.2.5
                  May 31, 2023 07:52:31.793417931 CEST497184032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:31.869072914 CEST403249718141.98.6.167192.168.2.5
                  May 31, 2023 07:52:32.042793989 CEST403249718141.98.6.167192.168.2.5
                  May 31, 2023 07:52:32.043777943 CEST497184032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:32.069828987 CEST403249718141.98.6.167192.168.2.5
                  May 31, 2023 07:52:32.131205082 CEST497184032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:32.157728910 CEST403249718141.98.6.167192.168.2.5
                  May 31, 2023 07:52:32.158015966 CEST497184032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:32.184813976 CEST403249718141.98.6.167192.168.2.5
                  May 31, 2023 07:52:32.184895992 CEST497184032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:32.211435080 CEST403249718141.98.6.167192.168.2.5
                  May 31, 2023 07:52:32.211591005 CEST497184032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:32.287476063 CEST403249718141.98.6.167192.168.2.5
                  May 31, 2023 07:52:32.289767981 CEST497184032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:32.368164062 CEST403249718141.98.6.167192.168.2.5
                  May 31, 2023 07:52:32.730530024 CEST497184032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:32.809969902 CEST403249718141.98.6.167192.168.2.5
                  May 31, 2023 07:52:33.710012913 CEST497184032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:39.469413996 CEST497194032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:39.495678902 CEST403249719141.98.6.167192.168.2.5
                  May 31, 2023 07:52:39.495812893 CEST497194032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:39.496237040 CEST497194032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:39.576056957 CEST403249719141.98.6.167192.168.2.5
                  May 31, 2023 07:52:39.576144934 CEST497194032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:39.628431082 CEST403249719141.98.6.167192.168.2.5
                  May 31, 2023 07:52:39.628652096 CEST497194032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:39.655756950 CEST403249719141.98.6.167192.168.2.5
                  May 31, 2023 07:52:39.659538031 CEST497194032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:39.736366987 CEST403249719141.98.6.167192.168.2.5
                  May 31, 2023 07:52:39.920053005 CEST403249719141.98.6.167192.168.2.5
                  May 31, 2023 07:52:39.920794010 CEST497194032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:39.947108030 CEST403249719141.98.6.167192.168.2.5
                  May 31, 2023 07:52:39.947978973 CEST497194032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:39.975187063 CEST403249719141.98.6.167192.168.2.5
                  May 31, 2023 07:52:39.975266933 CEST497194032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:40.002345085 CEST403249719141.98.6.167192.168.2.5
                  May 31, 2023 07:52:40.131887913 CEST497194032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:40.572860956 CEST497194032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:40.650033951 CEST403249719141.98.6.167192.168.2.5
                  May 31, 2023 07:52:41.592770100 CEST497194032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:47.297538996 CEST497204032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:47.323389053 CEST403249720141.98.6.167192.168.2.5
                  May 31, 2023 07:52:47.323476076 CEST497204032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:47.324080944 CEST497204032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:47.402231932 CEST403249720141.98.6.167192.168.2.5
                  May 31, 2023 07:52:47.440464973 CEST403249720141.98.6.167192.168.2.5
                  May 31, 2023 07:52:47.440726042 CEST497204032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:47.467405081 CEST403249720141.98.6.167192.168.2.5
                  May 31, 2023 07:52:47.476577044 CEST497204032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:47.548017025 CEST403249720141.98.6.167192.168.2.5
                  May 31, 2023 07:52:47.571897984 CEST497204032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:47.649141073 CEST403249720141.98.6.167192.168.2.5
                  May 31, 2023 07:52:47.697707891 CEST403249720141.98.6.167192.168.2.5
                  May 31, 2023 07:52:47.698489904 CEST497204032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:47.724407911 CEST403249720141.98.6.167192.168.2.5
                  May 31, 2023 07:52:47.773189068 CEST497204032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:47.799442053 CEST403249720141.98.6.167192.168.2.5
                  May 31, 2023 07:52:47.800455093 CEST497204032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:47.827100039 CEST403249720141.98.6.167192.168.2.5
                  May 31, 2023 07:52:47.827207088 CEST497204032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:47.856794119 CEST403249720141.98.6.167192.168.2.5
                  May 31, 2023 07:52:47.860367060 CEST497204032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:47.932245970 CEST403249720141.98.6.167192.168.2.5
                  May 31, 2023 07:52:48.788254976 CEST497204032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:48.866655111 CEST403249720141.98.6.167192.168.2.5
                  May 31, 2023 07:52:49.882978916 CEST497204032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:54.143754005 CEST497224032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:54.171341896 CEST403249722141.98.6.167192.168.2.5
                  May 31, 2023 07:52:54.171490908 CEST497224032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:54.172177076 CEST497224032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:54.256547928 CEST403249722141.98.6.167192.168.2.5
                  May 31, 2023 07:52:54.401691914 CEST403249722141.98.6.167192.168.2.5
                  May 31, 2023 07:52:54.406485081 CEST497224032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:54.460005999 CEST403249722141.98.6.167192.168.2.5
                  May 31, 2023 07:52:54.469652891 CEST497224032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:54.548324108 CEST403249722141.98.6.167192.168.2.5
                  May 31, 2023 07:52:54.921355009 CEST403249722141.98.6.167192.168.2.5
                  May 31, 2023 07:52:54.976980925 CEST497224032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:55.003806114 CEST403249722141.98.6.167192.168.2.5
                  May 31, 2023 07:52:55.055118084 CEST497224032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:55.127753973 CEST497224032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:55.205382109 CEST403249722141.98.6.167192.168.2.5
                  May 31, 2023 07:52:55.421502113 CEST497224032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:55.498167038 CEST403249722141.98.6.167192.168.2.5
                  May 31, 2023 07:52:55.500710011 CEST497224032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:55.527769089 CEST403249722141.98.6.167192.168.2.5
                  May 31, 2023 07:52:55.570698023 CEST497224032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:55.597248077 CEST403249722141.98.6.167192.168.2.5
                  May 31, 2023 07:52:55.648832083 CEST497224032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:55.783534050 CEST497224032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:55.858077049 CEST403249722141.98.6.167192.168.2.5
                  May 31, 2023 07:52:55.998811007 CEST497224032192.168.2.5141.98.6.167
                  May 31, 2023 07:52:56.068201065 CEST403249722141.98.6.167192.168.2.5
                  May 31, 2023 07:52:57.008615017 CEST497224032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:01.992913961 CEST497234032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:02.018815041 CEST403249723141.98.6.167192.168.2.5
                  May 31, 2023 07:53:02.018943071 CEST497234032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:02.033757925 CEST497234032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:02.110064030 CEST403249723141.98.6.167192.168.2.5
                  May 31, 2023 07:53:02.184133053 CEST403249723141.98.6.167192.168.2.5
                  May 31, 2023 07:53:02.184612036 CEST497234032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:02.211391926 CEST403249723141.98.6.167192.168.2.5
                  May 31, 2023 07:53:02.217597961 CEST497234032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:02.291239023 CEST403249723141.98.6.167192.168.2.5
                  May 31, 2023 07:53:02.300563097 CEST497234032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:02.368948936 CEST403249723141.98.6.167192.168.2.5
                  May 31, 2023 07:53:02.479144096 CEST403249723141.98.6.167192.168.2.5
                  May 31, 2023 07:53:02.536360979 CEST497234032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:02.562351942 CEST403249723141.98.6.167192.168.2.5
                  May 31, 2023 07:53:02.618199110 CEST497234032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:02.754399061 CEST497234032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:02.784751892 CEST403249723141.98.6.167192.168.2.5
                  May 31, 2023 07:53:02.784838915 CEST497234032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:02.811469078 CEST403249723141.98.6.167192.168.2.5
                  May 31, 2023 07:53:02.915102959 CEST497234032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:02.940990925 CEST403249723141.98.6.167192.168.2.5
                  May 31, 2023 07:53:03.024429083 CEST497234032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:03.171772957 CEST497234032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:03.257210970 CEST403249723141.98.6.167192.168.2.5
                  May 31, 2023 07:53:03.283582926 CEST497234032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:03.358099937 CEST403249723141.98.6.167192.168.2.5
                  May 31, 2023 07:53:04.275490046 CEST497234032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:08.346126080 CEST497244032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:08.372575045 CEST403249724141.98.6.167192.168.2.5
                  May 31, 2023 07:53:08.374887943 CEST497244032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:08.375675917 CEST497244032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:08.454605103 CEST403249724141.98.6.167192.168.2.5
                  May 31, 2023 07:53:08.478490114 CEST497244032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:08.488643885 CEST403249724141.98.6.167192.168.2.5
                  May 31, 2023 07:53:08.540560007 CEST497244032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:08.556190014 CEST403249724141.98.6.167192.168.2.5
                  May 31, 2023 07:53:08.556422949 CEST497244032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:08.584249020 CEST403249724141.98.6.167192.168.2.5
                  May 31, 2023 07:53:08.592406988 CEST497244032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:08.670134068 CEST403249724141.98.6.167192.168.2.5
                  May 31, 2023 07:53:08.860162020 CEST403249724141.98.6.167192.168.2.5
                  May 31, 2023 07:53:08.861191034 CEST497244032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:08.887809992 CEST403249724141.98.6.167192.168.2.5
                  May 31, 2023 07:53:08.890043974 CEST497244032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:08.917458057 CEST403249724141.98.6.167192.168.2.5
                  May 31, 2023 07:53:08.917881012 CEST497244032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:08.944773912 CEST403249724141.98.6.167192.168.2.5
                  May 31, 2023 07:53:08.993745089 CEST497244032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:09.266288042 CEST497244032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:09.342931986 CEST403249724141.98.6.167192.168.2.5
                  May 31, 2023 07:53:09.525594950 CEST497244032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:09.604072094 CEST403249724141.98.6.167192.168.2.5
                  May 31, 2023 07:53:10.526755095 CEST497244032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:15.210400105 CEST497254032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:15.238574982 CEST403249725141.98.6.167192.168.2.5
                  May 31, 2023 07:53:15.238729954 CEST497254032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:15.239238977 CEST497254032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:15.269918919 CEST403249725141.98.6.167192.168.2.5
                  May 31, 2023 07:53:15.322371006 CEST497254032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:15.353404999 CEST403249725141.98.6.167192.168.2.5
                  May 31, 2023 07:53:15.396611929 CEST497254032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:15.423578978 CEST403249725141.98.6.167192.168.2.5
                  May 31, 2023 07:53:15.478640079 CEST497254032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:15.478972912 CEST497254032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:15.556220055 CEST403249725141.98.6.167192.168.2.5
                  May 31, 2023 07:53:15.793905020 CEST403249725141.98.6.167192.168.2.5
                  May 31, 2023 07:53:15.838077068 CEST497254032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:15.864345074 CEST403249725141.98.6.167192.168.2.5
                  May 31, 2023 07:53:15.916235924 CEST497254032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:16.120328903 CEST497254032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:16.188631058 CEST403249725141.98.6.167192.168.2.5
                  May 31, 2023 07:53:16.188715935 CEST497254032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:16.218681097 CEST403249725141.98.6.167192.168.2.5
                  May 31, 2023 07:53:16.431865931 CEST497254032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:16.459389925 CEST403249725141.98.6.167192.168.2.5
                  May 31, 2023 07:53:16.475982904 CEST497254032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:20.693203926 CEST497264032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:20.719739914 CEST403249726141.98.6.167192.168.2.5
                  May 31, 2023 07:53:20.720026970 CEST497264032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:20.721069098 CEST497264032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:20.792135000 CEST403249726141.98.6.167192.168.2.5
                  May 31, 2023 07:53:20.830039978 CEST403249726141.98.6.167192.168.2.5
                  May 31, 2023 07:53:20.834434986 CEST497264032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:20.862144947 CEST403249726141.98.6.167192.168.2.5
                  May 31, 2023 07:53:20.923204899 CEST497264032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:21.006719112 CEST403249726141.98.6.167192.168.2.5
                  May 31, 2023 07:53:21.279230118 CEST403249726141.98.6.167192.168.2.5
                  May 31, 2023 07:53:21.280162096 CEST497264032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:21.306358099 CEST403249726141.98.6.167192.168.2.5
                  May 31, 2023 07:53:21.307323933 CEST497264032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:21.335403919 CEST403249726141.98.6.167192.168.2.5
                  May 31, 2023 07:53:21.352392912 CEST497264032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:21.380552053 CEST403249726141.98.6.167192.168.2.5
                  May 31, 2023 07:53:21.429582119 CEST497264032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:21.715954065 CEST497264032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:21.792052984 CEST403249726141.98.6.167192.168.2.5
                  May 31, 2023 07:53:23.328255892 CEST497264032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:27.375276089 CEST497274032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:27.403225899 CEST403249727141.98.6.167192.168.2.5
                  May 31, 2023 07:53:27.403424978 CEST497274032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:27.404072046 CEST497274032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:27.483052969 CEST403249727141.98.6.167192.168.2.5
                  May 31, 2023 07:53:27.561672926 CEST403249727141.98.6.167192.168.2.5
                  May 31, 2023 07:53:27.561983109 CEST497274032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:27.589463949 CEST403249727141.98.6.167192.168.2.5
                  May 31, 2023 07:53:27.596045017 CEST497274032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:27.670124054 CEST403249727141.98.6.167192.168.2.5
                  May 31, 2023 07:53:27.823411942 CEST403249727141.98.6.167192.168.2.5
                  May 31, 2023 07:53:27.865117073 CEST497274032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:27.891302109 CEST403249727141.98.6.167192.168.2.5
                  May 31, 2023 07:53:27.943222046 CEST497274032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:28.190823078 CEST497274032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:28.272542000 CEST403249727141.98.6.167192.168.2.5
                  May 31, 2023 07:53:28.580410957 CEST497274032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:28.607512951 CEST403249727141.98.6.167192.168.2.5
                  May 31, 2023 07:53:28.662053108 CEST497274032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:28.737273932 CEST497274032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:28.763737917 CEST403249727141.98.6.167192.168.2.5
                  May 31, 2023 07:53:28.818310022 CEST497274032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:28.901779890 CEST497274032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:28.980238914 CEST403249727141.98.6.167192.168.2.5
                  May 31, 2023 07:53:29.637744904 CEST497274032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:33.842197895 CEST497284032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:33.868412971 CEST403249728141.98.6.167192.168.2.5
                  May 31, 2023 07:53:33.868709087 CEST497284032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:33.869410992 CEST497284032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:33.947041035 CEST403249728141.98.6.167192.168.2.5
                  May 31, 2023 07:53:33.967302084 CEST403249728141.98.6.167192.168.2.5
                  May 31, 2023 07:53:34.036376953 CEST497284032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:34.063116074 CEST403249728141.98.6.167192.168.2.5
                  May 31, 2023 07:53:34.209458113 CEST497284032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:34.437550068 CEST497284032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:34.517330885 CEST403249728141.98.6.167192.168.2.5
                  May 31, 2023 07:53:34.705447912 CEST403249728141.98.6.167192.168.2.5
                  May 31, 2023 07:53:34.912667990 CEST497284032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:34.938878059 CEST403249728141.98.6.167192.168.2.5
                  May 31, 2023 07:53:35.100179911 CEST497284032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:35.126373053 CEST403249728141.98.6.167192.168.2.5
                  May 31, 2023 07:53:35.209600925 CEST497284032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:35.644782066 CEST497284032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:35.720222950 CEST403249728141.98.6.167192.168.2.5
                  May 31, 2023 07:53:36.028502941 CEST497284032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:36.106256962 CEST403249728141.98.6.167192.168.2.5
                  May 31, 2023 07:53:36.155706882 CEST497284032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:36.183490038 CEST403249728141.98.6.167192.168.2.5
                  May 31, 2023 07:53:36.189634085 CEST497284032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:36.217187881 CEST403249728141.98.6.167192.168.2.5
                  May 31, 2023 07:53:36.240298033 CEST497284032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:36.325225115 CEST403249728141.98.6.167192.168.2.5
                  May 31, 2023 07:53:36.859358072 CEST497284032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:36.940702915 CEST403249728141.98.6.167192.168.2.5
                  May 31, 2023 07:53:38.160454988 CEST497284032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:42.265922070 CEST497294032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:42.298512936 CEST403249729141.98.6.167192.168.2.5
                  May 31, 2023 07:53:42.302006960 CEST497294032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:42.302532911 CEST497294032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:42.380367994 CEST403249729141.98.6.167192.168.2.5
                  May 31, 2023 07:53:42.403784990 CEST403249729141.98.6.167192.168.2.5
                  May 31, 2023 07:53:42.444478035 CEST497294032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:42.454662085 CEST497294032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:42.482002974 CEST403249729141.98.6.167192.168.2.5
                  May 31, 2023 07:53:42.522605896 CEST497294032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:42.790381908 CEST497294032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:42.871371031 CEST403249729141.98.6.167192.168.2.5
                  May 31, 2023 07:53:43.029170036 CEST403249729141.98.6.167192.168.2.5
                  May 31, 2023 07:53:43.030227900 CEST497294032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:43.058717012 CEST403249729141.98.6.167192.168.2.5
                  May 31, 2023 07:53:43.100812912 CEST497294032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:43.127187967 CEST403249729141.98.6.167192.168.2.5
                  May 31, 2023 07:53:43.178904057 CEST497294032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:43.182141066 CEST497294032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:43.208790064 CEST403249729141.98.6.167192.168.2.5
                  May 31, 2023 07:53:43.209423065 CEST497294032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:43.237447023 CEST403249729141.98.6.167192.168.2.5
                  May 31, 2023 07:53:43.288391113 CEST497294032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:43.288922071 CEST497294032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:43.358206987 CEST403249729141.98.6.167192.168.2.5
                  May 31, 2023 07:53:44.273293018 CEST497294032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:48.345784903 CEST497304032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:48.373243093 CEST403249730141.98.6.167192.168.2.5
                  May 31, 2023 07:53:48.373425961 CEST497304032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:48.374058008 CEST497304032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:48.456224918 CEST403249730141.98.6.167192.168.2.5
                  May 31, 2023 07:53:48.456324100 CEST497304032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:48.505120993 CEST403249730141.98.6.167192.168.2.5
                  May 31, 2023 07:53:48.505897045 CEST497304032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:48.533442020 CEST403249730141.98.6.167192.168.2.5
                  May 31, 2023 07:53:48.538225889 CEST497304032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:48.613018990 CEST403249730141.98.6.167192.168.2.5
                  May 31, 2023 07:53:48.854895115 CEST403249730141.98.6.167192.168.2.5
                  May 31, 2023 07:53:48.898130894 CEST497304032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:48.924571991 CEST403249730141.98.6.167192.168.2.5
                  May 31, 2023 07:53:48.936294079 CEST497304032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:49.010626078 CEST403249730141.98.6.167192.168.2.5
                  May 31, 2023 07:53:49.010724068 CEST497304032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:49.037589073 CEST403249730141.98.6.167192.168.2.5
                  May 31, 2023 07:53:49.085663080 CEST497304032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:49.112093925 CEST403249730141.98.6.167192.168.2.5
                  May 31, 2023 07:53:49.163847923 CEST497304032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:49.256920099 CEST497304032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:49.334105015 CEST403249730141.98.6.167192.168.2.5
                  May 31, 2023 07:53:49.430104017 CEST497304032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:49.499332905 CEST403249730141.98.6.167192.168.2.5
                  May 31, 2023 07:53:50.485662937 CEST497304032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:54.534816980 CEST497314032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:54.561055899 CEST403249731141.98.6.167192.168.2.5
                  May 31, 2023 07:53:54.561292887 CEST497314032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:54.566546917 CEST497314032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:54.643152952 CEST403249731141.98.6.167192.168.2.5
                  May 31, 2023 07:53:54.656980038 CEST403249731141.98.6.167192.168.2.5
                  May 31, 2023 07:53:54.657442093 CEST497314032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:54.685261965 CEST403249731141.98.6.167192.168.2.5
                  May 31, 2023 07:53:54.689521074 CEST497314032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:54.763679981 CEST403249731141.98.6.167192.168.2.5
                  May 31, 2023 07:53:54.949208021 CEST403249731141.98.6.167192.168.2.5
                  May 31, 2023 07:53:54.950293064 CEST497314032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:54.976649046 CEST403249731141.98.6.167192.168.2.5
                  May 31, 2023 07:53:54.993052006 CEST497314032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:55.019239902 CEST403249731141.98.6.167192.168.2.5
                  May 31, 2023 07:53:55.019711971 CEST497314032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:55.046297073 CEST403249731141.98.6.167192.168.2.5
                  May 31, 2023 07:53:55.046479940 CEST497314032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:55.073249102 CEST403249731141.98.6.167192.168.2.5
                  May 31, 2023 07:53:55.273662090 CEST497314032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:56.008755922 CEST497314032192.168.2.5141.98.6.167
                  May 31, 2023 07:53:56.086241007 CEST403249731141.98.6.167192.168.2.5
                  May 31, 2023 07:53:57.024338007 CEST497314032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:01.096746922 CEST497324032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:01.124982119 CEST403249732141.98.6.167192.168.2.5
                  May 31, 2023 07:54:01.125155926 CEST497324032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:01.126019001 CEST497324032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:01.199943066 CEST403249732141.98.6.167192.168.2.5
                  May 31, 2023 07:54:01.272595882 CEST403249732141.98.6.167192.168.2.5
                  May 31, 2023 07:54:01.274036884 CEST497324032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:01.301387072 CEST403249732141.98.6.167192.168.2.5
                  May 31, 2023 07:54:01.308243036 CEST497324032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:01.380486012 CEST403249732141.98.6.167192.168.2.5
                  May 31, 2023 07:54:01.545583010 CEST403249732141.98.6.167192.168.2.5
                  May 31, 2023 07:54:01.546349049 CEST497324032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:01.572678089 CEST403249732141.98.6.167192.168.2.5
                  May 31, 2023 07:54:01.604566097 CEST497324032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:01.632533073 CEST403249732141.98.6.167192.168.2.5
                  May 31, 2023 07:54:01.638372898 CEST497324032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:01.665967941 CEST403249732141.98.6.167192.168.2.5
                  May 31, 2023 07:54:01.666188955 CEST497324032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:01.693345070 CEST403249732141.98.6.167192.168.2.5
                  May 31, 2023 07:54:01.743026018 CEST497324032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:02.704982996 CEST497324032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:02.782231092 CEST403249732141.98.6.167192.168.2.5
                  May 31, 2023 07:54:03.477991104 CEST497324032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:08.260874033 CEST497334032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:08.287441969 CEST403249733141.98.6.167192.168.2.5
                  May 31, 2023 07:54:08.287548065 CEST497334032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:08.288404942 CEST497334032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:08.365328074 CEST403249733141.98.6.167192.168.2.5
                  May 31, 2023 07:54:08.394526005 CEST403249733141.98.6.167192.168.2.5
                  May 31, 2023 07:54:08.394849062 CEST497334032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:08.421420097 CEST403249733141.98.6.167192.168.2.5
                  May 31, 2023 07:54:08.429188967 CEST497334032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:08.502173901 CEST403249733141.98.6.167192.168.2.5
                  May 31, 2023 07:54:08.525316954 CEST497334032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:08.602349997 CEST403249733141.98.6.167192.168.2.5
                  May 31, 2023 07:54:08.798707008 CEST403249733141.98.6.167192.168.2.5
                  May 31, 2023 07:54:08.799442053 CEST497334032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:08.825696945 CEST403249733141.98.6.167192.168.2.5
                  May 31, 2023 07:54:08.826559067 CEST497334032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:08.853260994 CEST403249733141.98.6.167192.168.2.5
                  May 31, 2023 07:54:08.853430033 CEST497334032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:08.880022049 CEST403249733141.98.6.167192.168.2.5
                  May 31, 2023 07:54:08.880320072 CEST497334032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:08.956180096 CEST403249733141.98.6.167192.168.2.5
                  May 31, 2023 07:54:13.317013025 CEST403249733141.98.6.167192.168.2.5
                  May 31, 2023 07:54:13.368957996 CEST497334032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:15.070466042 CEST403249733141.98.6.167192.168.2.5
                  May 31, 2023 07:54:15.166086912 CEST497334032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:18.317832947 CEST403249733141.98.6.167192.168.2.5
                  May 31, 2023 07:54:18.369469881 CEST497334032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:23.071069002 CEST403249733141.98.6.167192.168.2.5
                  May 31, 2023 07:54:23.166704893 CEST497334032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:23.318530083 CEST403249733141.98.6.167192.168.2.5
                  May 31, 2023 07:54:23.369832039 CEST497334032192.168.2.5141.98.6.167
                  May 31, 2023 07:54:28.319411993 CEST403249733141.98.6.167192.168.2.5
                  TimestampSource PortDest PortSource IPDest IP
                  May 31, 2023 07:52:11.096995115 CEST5148453192.168.2.58.8.8.8
                  May 31, 2023 07:52:11.132067919 CEST53514848.8.8.8192.168.2.5
                  May 31, 2023 07:52:19.967236996 CEST6344653192.168.2.58.8.8.8
                  May 31, 2023 07:52:19.994401932 CEST53634468.8.8.8192.168.2.5
                  May 31, 2023 07:52:31.550893068 CEST5675153192.168.2.58.8.8.8
                  May 31, 2023 07:52:31.574661016 CEST53567518.8.8.8192.168.2.5
                  May 31, 2023 07:52:39.431263924 CEST5503953192.168.2.58.8.8.8
                  May 31, 2023 07:52:39.459728003 CEST53550398.8.8.8192.168.2.5
                  May 31, 2023 07:52:47.050631046 CEST6097553192.168.2.58.8.8.8
                  May 31, 2023 07:52:47.079140902 CEST53609758.8.8.8192.168.2.5
                  May 31, 2023 07:52:54.107012987 CEST5506853192.168.2.58.8.8.8
                  May 31, 2023 07:52:54.142549038 CEST53550688.8.8.8192.168.2.5
                  May 31, 2023 07:53:01.813743114 CEST5668253192.168.2.58.8.8.8
                  May 31, 2023 07:53:01.833653927 CEST53566828.8.8.8192.168.2.5
                  May 31, 2023 07:53:08.316106081 CEST5853253192.168.2.58.8.8.8
                  May 31, 2023 07:53:08.344156027 CEST53585328.8.8.8192.168.2.5
                  May 31, 2023 07:53:15.173487902 CEST6265953192.168.2.58.8.8.8
                  May 31, 2023 07:53:15.208040953 CEST53626598.8.8.8192.168.2.5
                  May 31, 2023 07:53:20.671876907 CEST5858153192.168.2.58.8.8.8
                  May 31, 2023 07:53:20.692138910 CEST53585818.8.8.8192.168.2.5
                  May 31, 2023 07:53:27.353101015 CEST5626353192.168.2.58.8.8.8
                  May 31, 2023 07:53:27.373688936 CEST53562638.8.8.8192.168.2.5
                  May 31, 2023 07:53:33.785145044 CEST6551353192.168.2.58.8.8.8
                  May 31, 2023 07:53:33.819334030 CEST53655138.8.8.8192.168.2.5
                  May 31, 2023 07:53:42.233668089 CEST5668753192.168.2.58.8.8.8
                  May 31, 2023 07:53:42.262104034 CEST53566878.8.8.8192.168.2.5
                  May 31, 2023 07:53:48.309499025 CEST6441953192.168.2.58.8.8.8
                  May 31, 2023 07:53:48.344185114 CEST53644198.8.8.8192.168.2.5
                  May 31, 2023 07:53:54.513269901 CEST5268853192.168.2.58.8.8.8
                  May 31, 2023 07:53:54.533252001 CEST53526888.8.8.8192.168.2.5
                  May 31, 2023 07:54:01.059043884 CEST6134453192.168.2.58.8.8.8
                  May 31, 2023 07:54:01.094084024 CEST53613448.8.8.8192.168.2.5
                  May 31, 2023 07:54:08.144618988 CEST5397253192.168.2.58.8.8.8
                  May 31, 2023 07:54:08.171468973 CEST53539728.8.8.8192.168.2.5
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  May 31, 2023 07:52:11.096995115 CEST192.168.2.58.8.8.80xd0efStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                  May 31, 2023 07:52:19.967236996 CEST192.168.2.58.8.8.80xe4aaStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                  May 31, 2023 07:52:31.550893068 CEST192.168.2.58.8.8.80x54aaStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                  May 31, 2023 07:52:39.431263924 CEST192.168.2.58.8.8.80xebf7Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                  May 31, 2023 07:52:47.050631046 CEST192.168.2.58.8.8.80x42deStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                  May 31, 2023 07:52:54.107012987 CEST192.168.2.58.8.8.80x66feStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                  May 31, 2023 07:53:01.813743114 CEST192.168.2.58.8.8.80x5d11Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                  May 31, 2023 07:53:08.316106081 CEST192.168.2.58.8.8.80x3c6bStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                  May 31, 2023 07:53:15.173487902 CEST192.168.2.58.8.8.80x1b8aStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                  May 31, 2023 07:53:20.671876907 CEST192.168.2.58.8.8.80xf72cStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                  May 31, 2023 07:53:27.353101015 CEST192.168.2.58.8.8.80x7449Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                  May 31, 2023 07:53:33.785145044 CEST192.168.2.58.8.8.80x351eStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                  May 31, 2023 07:53:42.233668089 CEST192.168.2.58.8.8.80xd34Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                  May 31, 2023 07:53:48.309499025 CEST192.168.2.58.8.8.80xd633Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                  May 31, 2023 07:53:54.513269901 CEST192.168.2.58.8.8.80xdf79Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                  May 31, 2023 07:54:01.059043884 CEST192.168.2.58.8.8.80x8befStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                  May 31, 2023 07:54:08.144618988 CEST192.168.2.58.8.8.80x537bStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  May 31, 2023 07:52:11.132067919 CEST8.8.8.8192.168.2.50xd0efNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                  May 31, 2023 07:52:19.994401932 CEST8.8.8.8192.168.2.50xe4aaNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                  May 31, 2023 07:52:31.574661016 CEST8.8.8.8192.168.2.50x54aaNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                  May 31, 2023 07:52:39.459728003 CEST8.8.8.8192.168.2.50xebf7No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                  May 31, 2023 07:52:47.079140902 CEST8.8.8.8192.168.2.50x42deNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                  May 31, 2023 07:52:54.142549038 CEST8.8.8.8192.168.2.50x66feNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                  May 31, 2023 07:53:01.833653927 CEST8.8.8.8192.168.2.50x5d11No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                  May 31, 2023 07:53:08.344156027 CEST8.8.8.8192.168.2.50x3c6bNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                  May 31, 2023 07:53:15.208040953 CEST8.8.8.8192.168.2.50x1b8aNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                  May 31, 2023 07:53:20.692138910 CEST8.8.8.8192.168.2.50xf72cNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                  May 31, 2023 07:53:27.373688936 CEST8.8.8.8192.168.2.50x7449No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                  May 31, 2023 07:53:33.819334030 CEST8.8.8.8192.168.2.50x351eNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                  May 31, 2023 07:53:42.262104034 CEST8.8.8.8192.168.2.50xd34No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                  May 31, 2023 07:53:48.344185114 CEST8.8.8.8192.168.2.50xd633No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                  May 31, 2023 07:53:54.533252001 CEST8.8.8.8192.168.2.50xdf79No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                  May 31, 2023 07:54:01.094084024 CEST8.8.8.8192.168.2.50x8befNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                  May 31, 2023 07:54:08.171468973 CEST8.8.8.8192.168.2.50x537bNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:07:52:03
                  Start date:31/05/2023
                  Path:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  Imagebase:0x310000
                  File size:1107968 bytes
                  MD5 hash:E89323DD0063FB87B2115AF014BBAF94
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.396639113.0000000003771000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.396639113.0000000003771000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.396639113.0000000003771000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.396639113.0000000003771000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.396639113.000000000438A000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.396639113.000000000438A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.396639113.000000000438A000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.396639113.000000000438A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  Reputation:low

                  Target ID:1
                  Start time:07:52:06
                  Start date:31/05/2023
                  Path:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  Imagebase:0x470000
                  File size:1107968 bytes
                  MD5 hash:E89323DD0063FB87B2115AF014BBAF94
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.684510708.0000000006B60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.684510708.0000000006B60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.684510708.0000000006B60000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.684510708.0000000006B60000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.672248267.0000000003BFD000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.684765718.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.684765718.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.684765718.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.684765718.0000000006B90000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.681445042.0000000004FA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.681445042.0000000004FA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.681445042.0000000004FA0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.681445042.0000000004FA0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.684858574.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.684858574.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.684858574.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.684858574.0000000006BA0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.660971375.0000000002980000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.684333491.0000000006A10000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.684333491.0000000006A10000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.684333491.0000000006A10000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.684333491.0000000006A10000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.683574588.0000000006360000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.683574588.0000000006360000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.683574588.0000000006360000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.683574588.0000000006360000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.672248267.0000000003901000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.684621973.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.684621973.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.684621973.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.684621973.0000000006B70000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.685185862.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.685185862.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.685185862.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.685185862.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.683481713.0000000006350000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.683481713.0000000006350000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.683481713.0000000006350000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.683481713.0000000006350000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.684687442.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.684687442.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.684687442.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.684687442.0000000006B80000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.660971375.0000000002901000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.660971375.0000000002901000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.660971375.0000000002901000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.681733074.00000000051B0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.684948679.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.684948679.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.684948679.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.684948679.0000000006BB0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.685278523.0000000006BE0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.685278523.0000000006BE0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.685278523.0000000006BE0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.685278523.0000000006BE0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.685898407.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.685898407.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.685898407.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.685898407.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000003.404728224.0000000000B2A000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.672248267.00000000039F8000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  Reputation:low

                  Target ID:2
                  Start time:07:52:08
                  Start date:31/05/2023
                  Path:C:\Windows\SysWOW64\schtasks.exe
                  Wow64 process (32bit):true
                  Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp1C83.tmp
                  Imagebase:0x1190000
                  File size:185856 bytes
                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:3
                  Start time:07:52:08
                  Start date:31/05/2023
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7fcd70000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:4
                  Start time:07:52:09
                  Start date:31/05/2023
                  Path:C:\Windows\SysWOW64\schtasks.exe
                  Wow64 process (32bit):true
                  Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmp1E68.tmp
                  Imagebase:0x1190000
                  File size:185856 bytes
                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:5
                  Start time:07:52:09
                  Start date:31/05/2023
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7fcd70000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:6
                  Start time:07:52:11
                  Start date:31/05/2023
                  Path:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\Desktop\SAaX2wNRn2.exe 0
                  Imagebase:0xb50000
                  File size:1107968 bytes
                  MD5 hash:E89323DD0063FB87B2115AF014BBAF94
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Reputation:low

                  Target ID:7
                  Start time:07:52:11
                  Start date:31/05/2023
                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                  Imagebase:0x750000
                  File size:1107968 bytes
                  MD5 hash:E89323DD0063FB87B2115AF014BBAF94
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 38%, ReversingLabs
                  Reputation:low

                  Target ID:10
                  Start time:07:52:16
                  Start date:31/05/2023
                  Path:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  Imagebase:0xd0000
                  File size:1107968 bytes
                  MD5 hash:E89323DD0063FB87B2115AF014BBAF94
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low

                  Target ID:11
                  Start time:07:52:16
                  Start date:31/05/2023
                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                  Imagebase:0x340000
                  File size:1107968 bytes
                  MD5 hash:E89323DD0063FB87B2115AF014BBAF94
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low

                  Target ID:12
                  Start time:07:52:16
                  Start date:31/05/2023
                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                  Imagebase:0xec0000
                  File size:1107968 bytes
                  MD5 hash:E89323DD0063FB87B2115AF014BBAF94
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000C.00000002.463275758.00000000042F6000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000C.00000002.463275758.0000000004289000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.458436332.0000000003281000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.458436332.0000000003281000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000C.00000002.458436332.0000000003281000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  Reputation:low

                  Target ID:13
                  Start time:07:52:16
                  Start date:31/05/2023
                  Path:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  Imagebase:0xc0000
                  File size:1107968 bytes
                  MD5 hash:E89323DD0063FB87B2115AF014BBAF94
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low

                  Target ID:14
                  Start time:07:52:17
                  Start date:31/05/2023
                  Path:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\Desktop\SAaX2wNRn2.exe
                  Imagebase:0xbe0000
                  File size:1107968 bytes
                  MD5 hash:E89323DD0063FB87B2115AF014BBAF94
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.450850684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.450850684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.450850684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000002.450850684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.462495853.0000000003091000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.462495853.0000000003091000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000E.00000002.462495853.0000000003091000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                  Target ID:15
                  Start time:07:52:17
                  Start date:31/05/2023
                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                  Imagebase:0x2c0000
                  File size:1107968 bytes
                  MD5 hash:E89323DD0063FB87B2115AF014BBAF94
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:.Net C# or VB.NET

                  Target ID:16
                  Start time:07:52:31
                  Start date:31/05/2023
                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                  Imagebase:0xe30000
                  File size:1107968 bytes
                  MD5 hash:E89323DD0063FB87B2115AF014BBAF94
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:.Net C# or VB.NET

                  Reset < >

                    Execution Graph

                    Execution Coverage:10.8%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:8.6%
                    Total number of Nodes:233
                    Total number of Limit Nodes:10
                    execution_graph 21779 4ca4ae8 21780 4ca4b15 21779->21780 21803 4ca46bc 21780->21803 21784 4ca4bb5 21785 4ca4938 2 API calls 21784->21785 21786 4ca4be7 21785->21786 21812 4ca4958 21786->21812 21788 4ca4c84 21816 4ca4978 21788->21816 21790 4ca4d45 21791 4ca4958 LoadLibraryExW 21790->21791 21792 4ca4e88 21791->21792 21793 4ca4978 LoadLibraryExW 21792->21793 21794 4ca51ba 21793->21794 21795 4ca4958 LoadLibraryExW 21794->21795 21796 4ca523f 21795->21796 21797 4ca4978 LoadLibraryExW 21796->21797 21798 4ca5316 21797->21798 21799 4ca4958 LoadLibraryExW 21798->21799 21800 4ca5381 21799->21800 21801 4ca4978 LoadLibraryExW 21800->21801 21802 4ca54bf 21801->21802 21804 4ca46c7 21803->21804 21820 4ca4a68 21804->21820 21806 4ca4b83 21807 4ca4938 21806->21807 21808 4ca4943 21807->21808 21810 d85858 2 API calls 21808->21810 21811 d87170 2 API calls 21808->21811 21809 4ca5e2b 21809->21784 21810->21809 21811->21809 21813 4ca4963 21812->21813 21958 4ca58cc 21813->21958 21815 4ca6e16 21815->21788 21817 4ca4983 21816->21817 21818 4ca58cc LoadLibraryExW 21817->21818 21819 4ca92af 21818->21819 21819->21790 21821 4ca4a73 21820->21821 21825 d87170 21821->21825 21834 d85858 21821->21834 21822 4ca5bac 21822->21806 21826 d87175 21825->21826 21828 d8741e 21826->21828 21843 4ca65f8 21826->21843 21847 4ca6608 21826->21847 21851 4ca5c40 21826->21851 21827 d8745c 21827->21822 21828->21827 21854 d8b33f 21828->21854 21859 d8b340 21828->21859 21835 d85863 21834->21835 21837 d8741e 21835->21837 21838 4ca65f8 LoadLibraryExW 21835->21838 21839 4ca6608 LoadLibraryExW 21835->21839 21840 4ca5c40 LoadLibraryExW 21835->21840 21836 d8745c 21836->21822 21837->21836 21841 d8b33f 2 API calls 21837->21841 21842 d8b340 2 API calls 21837->21842 21838->21837 21839->21837 21840->21837 21841->21836 21842->21836 21864 d892f8 21843->21864 21869 d89308 21843->21869 21844 4ca6616 21844->21828 21848 4ca6616 21847->21848 21849 d892f8 LoadLibraryExW 21847->21849 21850 d89308 LoadLibraryExW 21847->21850 21848->21828 21849->21848 21850->21848 21886 4ca5ca8 21851->21886 21852 4ca5c4e 21852->21828 21855 d8b361 21854->21855 21856 d8b385 21855->21856 21890 d8b5f8 21855->21890 21894 d8b5eb 21855->21894 21856->21827 21860 d8b361 21859->21860 21861 d8b385 21860->21861 21862 d8b5f8 2 API calls 21860->21862 21863 d8b5eb 2 API calls 21860->21863 21861->21827 21862->21861 21863->21861 21865 d8931b 21864->21865 21866 d8932b 21865->21866 21874 d89998 21865->21874 21878 d89997 21865->21878 21866->21844 21870 d8931b 21869->21870 21871 d8932b 21870->21871 21872 d89998 LoadLibraryExW 21870->21872 21873 d89997 LoadLibraryExW 21870->21873 21871->21844 21872->21871 21873->21871 21875 d899ac 21874->21875 21877 d899d1 21875->21877 21882 d894f8 21875->21882 21877->21866 21879 d899ac 21878->21879 21880 d899d1 21879->21880 21881 d894f8 LoadLibraryExW 21879->21881 21880->21866 21881->21880 21883 d89b78 LoadLibraryExW 21882->21883 21885 d89bf1 21883->21885 21885->21877 21888 d892f8 LoadLibraryExW 21886->21888 21889 d89308 LoadLibraryExW 21886->21889 21887 4ca5cb7 21887->21852 21888->21887 21889->21887 21891 d8b605 21890->21891 21892 d8b63f 21891->21892 21898 d897f8 21891->21898 21892->21856 21895 d8b605 21894->21895 21896 d8b63f 21895->21896 21897 d897f8 2 API calls 21895->21897 21896->21856 21897->21896 21899 d89803 21898->21899 21901 d8c338 21899->21901 21902 d898c0 21899->21902 21903 d898cb 21902->21903 21904 d85858 2 API calls 21903->21904 21905 d8c3a7 21903->21905 21904->21905 21909 d8e118 21905->21909 21919 d8e128 21905->21919 21906 d8c3e0 21906->21901 21911 d8e159 21909->21911 21913 d8e24a 21909->21913 21910 d8e165 21910->21906 21911->21910 21929 d8e598 21911->21929 21933 d8e5a8 21911->21933 21937 d8e5e1 21911->21937 21912 d8e1a5 21942 d8ef6f 21912->21942 21947 d8ef70 21912->21947 21913->21906 21921 d8e159 21919->21921 21922 d8e24a 21919->21922 21920 d8e165 21920->21906 21921->21920 21924 d8e598 LoadLibraryExW 21921->21924 21925 d8e5a8 LoadLibraryExW 21921->21925 21926 d8e5e1 LoadLibraryExW 21921->21926 21922->21906 21923 d8e1a5 21927 d8ef6f CreateWindowExW 21923->21927 21928 d8ef70 CreateWindowExW 21923->21928 21924->21923 21925->21923 21926->21923 21927->21922 21928->21922 21930 d8e5a8 21929->21930 21931 d89308 LoadLibraryExW 21930->21931 21932 d8e5b1 21931->21932 21932->21912 21934 d8e5ab 21933->21934 21935 d89308 LoadLibraryExW 21934->21935 21936 d8e5b1 21935->21936 21936->21912 21938 d8e5ea 21937->21938 21939 d8e5ab 21937->21939 21940 d89308 LoadLibraryExW 21939->21940 21941 d8e5b1 21940->21941 21941->21912 21943 d8ef9a 21942->21943 21944 d8f041 21943->21944 21952 d8fd28 21943->21952 21955 d8fd27 21943->21955 21948 d8ef9a 21947->21948 21949 d8f041 21948->21949 21950 d8fd28 CreateWindowExW 21948->21950 21951 d8fd27 CreateWindowExW 21948->21951 21950->21949 21951->21949 21953 d8de4c CreateWindowExW 21952->21953 21954 d8fd5d 21953->21954 21954->21944 21956 d8fd5d 21955->21956 21957 d8de4c CreateWindowExW 21955->21957 21956->21944 21957->21956 21959 4ca58d7 21958->21959 21960 4ca6ed0 21959->21960 21967 4caabe0 21959->21967 21971 4caac74 21959->21971 21976 4ca6ee1 21959->21976 21980 4ca6ef0 21959->21980 21984 4caabf0 21959->21984 21960->21815 21961 4ca6e9a 21961->21815 21968 4caac10 21967->21968 21969 4ca6ef0 LoadLibraryExW 21968->21969 21970 4caac69 21969->21970 21970->21961 21972 4caac82 21971->21972 21973 4caac32 21971->21973 21974 4ca6ef0 LoadLibraryExW 21973->21974 21975 4caac69 21974->21975 21975->21961 21977 4ca6f1f 21976->21977 21979 4ca6fb5 21977->21979 21988 4ca5920 21977->21988 21982 4ca6f1f 21980->21982 21981 4ca6fb5 21982->21981 21983 4ca5920 LoadLibraryExW 21982->21983 21983->21981 21987 4caac10 21984->21987 21985 4ca6ef0 LoadLibraryExW 21986 4caac69 21985->21986 21986->21961 21987->21985 21989 4ca592b 21988->21989 21991 4ca65f8 LoadLibraryExW 21989->21991 21992 4ca6608 LoadLibraryExW 21989->21992 21993 4ca5c40 LoadLibraryExW 21989->21993 21990 4ca779a 21990->21979 21991->21990 21992->21990 21993->21990 21994 d840d0 21995 d840e2 21994->21995 21996 d840ee 21995->21996 22000 d841e0 21995->22000 22005 d83c64 21996->22005 21998 d8410d 22001 d84205 22000->22001 22009 d842df 22001->22009 22013 d842e0 22001->22013 22006 d83c6f 22005->22006 22021 d851a4 22006->22021 22008 d86a80 22008->21998 22011 d84307 22009->22011 22010 d843e4 22010->22010 22011->22010 22017 d83de4 22011->22017 22015 d84307 22013->22015 22014 d843e4 22015->22014 22016 d83de4 CreateActCtxA 22015->22016 22016->22014 22018 d85370 CreateActCtxA 22017->22018 22020 d85433 22018->22020 22022 d851af 22021->22022 22025 d857f8 22022->22025 22024 d86b25 22024->22008 22026 d85803 22025->22026 22029 d85828 22026->22029 22028 d86c02 22028->22024 22030 d85833 22029->22030 22031 d85858 2 API calls 22030->22031 22032 d86d02 22031->22032 22032->22028 22033 d898f0 22034 d89938 GetModuleHandleW 22033->22034 22035 d89932 22033->22035 22036 d89965 22034->22036 22035->22034 22037 d89210 22038 d8921f 22037->22038 22039 d892f8 LoadLibraryExW 22037->22039 22040 d89308 LoadLibraryExW 22037->22040 22039->22038 22040->22038 22041 d8b710 22042 d8b776 22041->22042 22046 d8b8cb 22042->22046 22049 d8b8d0 22042->22049 22043 d8b825 22047 d8b8fe 22046->22047 22052 d89880 22046->22052 22047->22043 22050 d89880 DuplicateHandle 22049->22050 22051 d8b8fe 22050->22051 22051->22043 22053 d8b938 DuplicateHandle 22052->22053 22054 d8b9ce 22053->22054 22054->22047 22055 4ca2381 22059 4ca23af 22055->22059 22063 4ca23b0 22055->22063 22056 4ca239a 22060 4ca23f2 22059->22060 22062 4ca23f9 22059->22062 22061 4ca244a CallWindowProcW 22060->22061 22060->22062 22061->22062 22062->22056 22064 4ca23f2 22063->22064 22066 4ca23f9 22063->22066 22065 4ca244a CallWindowProcW 22064->22065 22064->22066 22065->22066 22066->22056
                    Memory Dump Source
                    • Source File: 00000000.00000002.400999660.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4ca0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9677a9f68df380491d2661f20f1e469078a295a4cd310ea0a8d3891d2e598801
                    • Instruction ID: 90d3097a67390fe682fc7b4e309aeb393f6288d0f88a1e9b138e5bc367cae6db
                    • Opcode Fuzzy Hash: 9677a9f68df380491d2661f20f1e469078a295a4cd310ea0a8d3891d2e598801
                    • Instruction Fuzzy Hash: 3072F434A01619CFDB54EF64C884AD9B7B2FF8A304F5185E9D4096B360EB70AE95CF41
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.400999660.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4ca0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b4abed31b167bf50a4658395dff82855f28f072654175c680a4dcaac6b645f7e
                    • Instruction ID: f0f373f97f7ea8867557ef31f7716e526ddc04fa22ae1710662b087dec8bd633
                    • Opcode Fuzzy Hash: b4abed31b167bf50a4658395dff82855f28f072654175c680a4dcaac6b645f7e
                    • Instruction Fuzzy Hash: 2F720434A01619CFDB54EF64C884AD9B7B2FF8A304F5186E9D4496B360EB70AE91CF40
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 d8de30-d8fdde 4 d8fde9-d8fdf0 0->4 5 d8fde0-d8fde6 0->5 6 d8fdfb-d8fe33 4->6 7 d8fdf2-d8fdf8 4->7 5->4 8 d8fe3b-d8fe9a CreateWindowExW 6->8 7->6 9 d8fe9c-d8fea2 8->9 10 d8fea3-d8fedb 8->10 9->10 14 d8fee8 10->14 15 d8fedd-d8fee0 10->15 16 d8fee9 14->16 15->14 16->16
                    APIs
                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00D8FE8A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.394651074.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d80000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: CreateWindow
                    • String ID: Yx<b$Yx<b
                    • API String ID: 716092398-1700495710
                    • Opcode ID: 4e45d008d769fb4b168b58dfe6cf6d75e4ec0bc8ace84bc3b431606fdfb1d220
                    • Instruction ID: 37f49b5660a8ed2cdf36c18f77fb1a638cd1619dd351c577df3248daa4c97d55
                    • Opcode Fuzzy Hash: 4e45d008d769fb4b168b58dfe6cf6d75e4ec0bc8ace84bc3b431606fdfb1d220
                    • Instruction Fuzzy Hash: D15113B1D00349DFDB11DFAAC890ADEBFB1BF48310F24816AE815AB251D7749885CFA0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 32 d8fd6c-d8fdde 33 d8fde9-d8fdf0 32->33 34 d8fde0-d8fde6 32->34 35 d8fdfb-d8fe33 33->35 36 d8fdf2-d8fdf8 33->36 34->33 37 d8fe3b-d8fe9a CreateWindowExW 35->37 36->35 38 d8fe9c-d8fea2 37->38 39 d8fea3-d8fedb 37->39 38->39 43 d8fee8 39->43 44 d8fedd-d8fee0 39->44 45 d8fee9 43->45 44->43 45->45
                    APIs
                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00D8FE8A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.394651074.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d80000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: CreateWindow
                    • String ID: Yx<b$Yx<b
                    • API String ID: 716092398-1700495710
                    • Opcode ID: 063bdb991cbd92e47ecfb9dfedde45ff1f61f5ed533375e63dbf012ea68c9030
                    • Instruction ID: 217308201778cd2d62ba60e49ba348c35d468788fe2506c82ef4f6b39f11e314
                    • Opcode Fuzzy Hash: 063bdb991cbd92e47ecfb9dfedde45ff1f61f5ed533375e63dbf012ea68c9030
                    • Instruction Fuzzy Hash: 5451C0B1D00309DFDB15DF9AD884ADEBFB5BF48310F24822AE819AB250D774A945CF90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 17 d8de4c-d8fdde 19 d8fde9-d8fdf0 17->19 20 d8fde0-d8fde6 17->20 21 d8fdfb-d8fe9a CreateWindowExW 19->21 22 d8fdf2-d8fdf8 19->22 20->19 24 d8fe9c-d8fea2 21->24 25 d8fea3-d8fedb 21->25 22->21 24->25 29 d8fee8 25->29 30 d8fedd-d8fee0 25->30 31 d8fee9 29->31 30->29 31->31
                    APIs
                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00D8FE8A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.394651074.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d80000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: CreateWindow
                    • String ID: Yx<b$Yx<b
                    • API String ID: 716092398-1700495710
                    • Opcode ID: eeb20e7e96c2827a0a2bb8bc4cb955a1c7573bbde22e5b2d49d6b60d6668ef2a
                    • Instruction ID: 214d767780106032272d0faf7a0ff3286a0d9051eee9b5fb2416057202d73f7e
                    • Opcode Fuzzy Hash: eeb20e7e96c2827a0a2bb8bc4cb955a1c7573bbde22e5b2d49d6b60d6668ef2a
                    • Instruction Fuzzy Hash: B251CFB1D00309DFDB15DF9AC984ADEBBB5FF48310F24812AE819AB210D774A985CF90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 83 d83de4-d85431 CreateActCtxA 86 d8543a-d85494 83->86 87 d85433-d85439 83->87 94 d854a3-d854a7 86->94 95 d85496-d85499 86->95 87->86 96 d854b8 94->96 97 d854a9-d854b5 94->97 95->94 99 d854b9 96->99 97->96 99->99
                    APIs
                    • CreateActCtxA.KERNEL32(?), ref: 00D85421
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.394651074.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d80000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: Create
                    • String ID: Yx<b
                    • API String ID: 2289755597-502062935
                    • Opcode ID: 1e339fafd6c4ef68b5d70836e846c25a7e72f81b5cc1c3f9962dbed635dae7cd
                    • Instruction ID: a35617e689c52fce216ad64ffbd697a0a66e9ce7cc18ce8636494eba538cc058
                    • Opcode Fuzzy Hash: 1e339fafd6c4ef68b5d70836e846c25a7e72f81b5cc1c3f9962dbed635dae7cd
                    • Instruction Fuzzy Hash: D841E0B0D0061CCFDB24DFA9C984B9DBBB5BF48304F20806AD409AB255D7B56985CFA0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 100 d8536b-d85431 CreateActCtxA 102 d8543a-d85494 100->102 103 d85433-d85439 100->103 110 d854a3-d854a7 102->110 111 d85496-d85499 102->111 103->102 112 d854b8 110->112 113 d854a9-d854b5 110->113 111->110 115 d854b9 112->115 113->112 115->115
                    APIs
                    • CreateActCtxA.KERNEL32(?), ref: 00D85421
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.394651074.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d80000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: Create
                    • String ID: Yx<b
                    • API String ID: 2289755597-502062935
                    • Opcode ID: 6370ac41004cc701dde804a6e5ab4c550fc93fcfda85ea96bd2d1bfbcb7ce4b3
                    • Instruction ID: a09e5274d0e10fe9d765f0bf14ae08ce7d61bf7ae77f79d3159d4300902c437e
                    • Opcode Fuzzy Hash: 6370ac41004cc701dde804a6e5ab4c550fc93fcfda85ea96bd2d1bfbcb7ce4b3
                    • Instruction Fuzzy Hash: A941E2B1D0061CCFDB24DFA9C9847CDBBB5BF48305F24806AD409AB255D7B56986CFA0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 116 4ca23b0-4ca23ec 117 4ca249c-4ca24bc 116->117 118 4ca23f2-4ca23f7 116->118 125 4ca24bf-4ca24cc 117->125 119 4ca244a-4ca2482 CallWindowProcW 118->119 120 4ca23f9-4ca2430 118->120 121 4ca248b-4ca249a 119->121 122 4ca2484-4ca248a 119->122 126 4ca2439-4ca2448 120->126 127 4ca2432-4ca2438 120->127 121->125 122->121 126->125 127->126
                    APIs
                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 04CA2471
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.400999660.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4ca0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: CallProcWindow
                    • String ID: Yx<b
                    • API String ID: 2714655100-502062935
                    • Opcode ID: 5f88f0e3a3eb39da7305c3b3ddec0ad477cc36f4987569add762729bc178a627
                    • Instruction ID: d801015f5b48298c1a9bf8f68bd886be1348a0f43f7c0448368865a4bfbb0c3c
                    • Opcode Fuzzy Hash: 5f88f0e3a3eb39da7305c3b3ddec0ad477cc36f4987569add762729bc178a627
                    • Instruction Fuzzy Hash: D8410CB5900315CFDB14CF99C448B9ABBF6FF88314F148499D519AB321D374A941CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 130 d89880-d8b9cc DuplicateHandle 132 d8b9ce-d8b9d4 130->132 133 d8b9d5-d8b9f2 130->133 132->133
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00D8B8FE,?,?,?,?,?), ref: 00D8B9BF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.394651074.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d80000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID: Yx<b
                    • API String ID: 3793708945-502062935
                    • Opcode ID: 2b3b2288a14436a81b06776797837b55329ecd83585e4f50c5b08f7940ce94fb
                    • Instruction ID: 568c5da0465aaeb1c84abf77da7e2a31207a58e4ace66f4508d8eea013d4e9a0
                    • Opcode Fuzzy Hash: 2b3b2288a14436a81b06776797837b55329ecd83585e4f50c5b08f7940ce94fb
                    • Instruction Fuzzy Hash: 612105B5900208EFDB10DF9AD584AEEBFF4EB48320F14841AE914B7310D374A940DFA4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 136 d8b937-d8b9cc DuplicateHandle 137 d8b9ce-d8b9d4 136->137 138 d8b9d5-d8b9f2 136->138 137->138
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00D8B8FE,?,?,?,?,?), ref: 00D8B9BF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.394651074.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d80000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID: Yx<b
                    • API String ID: 3793708945-502062935
                    • Opcode ID: fe0a66eed5c68e474615caf03417ebd7f23c07148b7f339eaee53b08f0904474
                    • Instruction ID: 9533d590e7b3b849dfe8b35ee56b8a3328278fb40fe1643bcdf301f1786f7860
                    • Opcode Fuzzy Hash: fe0a66eed5c68e474615caf03417ebd7f23c07148b7f339eaee53b08f0904474
                    • Instruction Fuzzy Hash: E221E4B5D002099FDB10CF9AD584ADEBFF4EF48320F14841AE914A7310D374A944DFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 141 d89b71-d89b75 142 d89b39 141->142 143 d89b77-d89b89 141->143 144 d89b8a-d89bb8 142->144 145 d89b3b 142->145 143->144 146 d89bba-d89bbd 144->146 147 d89bc0-d89bef LoadLibraryExW 144->147 145->141 146->147 148 d89bf8-d89c15 147->148 149 d89bf1-d89bf7 147->149 149->148
                    APIs
                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00D899D1,00000800,00000000,00000000), ref: 00D89BE2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.394651074.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d80000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID: Yx<b
                    • API String ID: 1029625771-502062935
                    • Opcode ID: c05cda16a055700bb0ed3eea6da496b5bec8c7b3dd922c2f8f6ba41bdcb969ad
                    • Instruction ID: 9ab44e1dbd06e5d6dce78ddc3078ef495084833b07537e11dd6bf0713af72e5b
                    • Opcode Fuzzy Hash: c05cda16a055700bb0ed3eea6da496b5bec8c7b3dd922c2f8f6ba41bdcb969ad
                    • Instruction Fuzzy Hash: 772115B6D002498FDB10DF9AD484AEEFBF4EB88720F18842AD455A7600C3B4A945CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 152 d894f8-d89bb8 154 d89bba-d89bbd 152->154 155 d89bc0-d89bef LoadLibraryExW 152->155 154->155 156 d89bf8-d89c15 155->156 157 d89bf1-d89bf7 155->157 157->156
                    APIs
                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00D899D1,00000800,00000000,00000000), ref: 00D89BE2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.394651074.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d80000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID: Yx<b
                    • API String ID: 1029625771-502062935
                    • Opcode ID: d2b81ac13fa2384a594811130bf89b9024fc44d8f826d1b18e4963744b603b08
                    • Instruction ID: d0769b4c7ae0a1f7c55b43a23a47b4ae3d602710e902bdf9149a4260cfeb0f24
                    • Opcode Fuzzy Hash: d2b81ac13fa2384a594811130bf89b9024fc44d8f826d1b18e4963744b603b08
                    • Instruction Fuzzy Hash: 1A1103B69002099FDB10DF9AD484BEEFBF4EB48320F14842AE459A7200C3B4A945CFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 166 d898f0-d89930 167 d89938-d89963 GetModuleHandleW 166->167 168 d89932-d89935 166->168 169 d8996c-d89980 167->169 170 d89965-d8996b 167->170 168->167 170->169
                    APIs
                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00D89956
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.394651074.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d80000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: HandleModule
                    • String ID: Yx<b
                    • API String ID: 4139908857-502062935
                    • Opcode ID: 377fa9eb029287a411ae6ec1af5fa10554e6e76f7d62a2a6c937eb41e16e8b45
                    • Instruction ID: b546738f46abe88eb026f304d303cc37e2d92765e553332f1bf96d00f9cf2300
                    • Opcode Fuzzy Hash: 377fa9eb029287a411ae6ec1af5fa10554e6e76f7d62a2a6c937eb41e16e8b45
                    • Instruction Fuzzy Hash: 5D110FB6C002498FCB10DF9AC844BDEFBF8AF88320F14842AD869B7600C374A545CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 160 d898ef-d89930 161 d89938-d89963 GetModuleHandleW 160->161 162 d89932-d89935 160->162 163 d8996c-d89980 161->163 164 d89965-d8996b 161->164 162->161 164->163
                    APIs
                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00D89956
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.394651074.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d80000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: HandleModule
                    • String ID: Yx<b
                    • API String ID: 4139908857-502062935
                    • Opcode ID: 077440f70a27d5d203c33833234634afd1043427b3f8283acfc9660e64dc900c
                    • Instruction ID: 752555b89c2dbadfcd0a1d382593b8f8975a3a7d50112f0972246fe6ad92fceb
                    • Opcode Fuzzy Hash: 077440f70a27d5d203c33833234634afd1043427b3f8283acfc9660e64dc900c
                    • Instruction Fuzzy Hash: 70110FB6C002498FCB10DF9AD444BDEFBF4AF88320F14842AD869B7600C374A546CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.394530365.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_cdd000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: eaf1e99bafe26d89fb0ce13323c2969ffb2e78284fa482ae0e400511a2f2dd87
                    • Instruction ID: 63e1ff4b3234a7e6722ded9ec0488f85a9cbf7c4fa57bb2af581a525422c7464
                    • Opcode Fuzzy Hash: eaf1e99bafe26d89fb0ce13323c2969ffb2e78284fa482ae0e400511a2f2dd87
                    • Instruction Fuzzy Hash: 732128B1904240DFDB15DF14E9C0B26BF65FB84328F24866AE9460B306D336D946D7A1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.394552529.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ced000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f3250ffdc01172191eaaf31ad8b523d7e36dd7f369cb1e8b73bec94f531db563
                    • Instruction ID: c120b825b4589ccc1e2d4c5c923baad37a694dab009670a086582b4995009a0c
                    • Opcode Fuzzy Hash: f3250ffdc01172191eaaf31ad8b523d7e36dd7f369cb1e8b73bec94f531db563
                    • Instruction Fuzzy Hash: 20210475604280DFDB15DF15D9C0B16BBA5FB84324F28CA69E84B4B246C336D847DB61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.394552529.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ced000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: bb41cbef9f5b735291603f7e277077c85c4c8e74ad36f82b923666ec12f73fa2
                    • Instruction ID: fd1d8a2b15e74e5eafa773db85f6a4aef453f1189a61ec66822337a9c722a9c0
                    • Opcode Fuzzy Hash: bb41cbef9f5b735291603f7e277077c85c4c8e74ad36f82b923666ec12f73fa2
                    • Instruction Fuzzy Hash: A4212675504280EFDB05DF15D9C0B26BBA5FB84324F24CAADE94B4B246C33ADC46DB61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.394552529.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ced000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 81686769defbf93e6d0f35d60ca0bd6ef5cc8ebb50e66167299958ba00dd5bc6
                    • Instruction ID: 0e99fc47bd071ede8ed8f8b420699cf09ff732a54a6eb85bf78a15c377dd933d
                    • Opcode Fuzzy Hash: 81686769defbf93e6d0f35d60ca0bd6ef5cc8ebb50e66167299958ba00dd5bc6
                    • Instruction Fuzzy Hash: 512180755093C08FCB02CF24D990715BF71EB46314F28C5EAD8498F6A7C33A980ACB62
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.394530365.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_cdd000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b3d282c62180620417641dd9b9a0e49e7b7255b4f86f8dc055538552fd58bc37
                    • Instruction ID: 596615e67ab074bf14607f7e9f3ac8a719385582db3ce89a12ebddb1c01b2a6d
                    • Opcode Fuzzy Hash: b3d282c62180620417641dd9b9a0e49e7b7255b4f86f8dc055538552fd58bc37
                    • Instruction Fuzzy Hash: 9511E6B6904280DFCB16CF14D5C4B16BF71FB84324F24C6AAD9450B716C336D956CBA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.394552529.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_ced000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f825cc49a36603e58b05d30dbcded4ff69a659c0c942629433790640a090c2f4
                    • Instruction ID: 5a296c4c37b55e265784c737e0e57fc607935662399adac15ce1ee1960110833
                    • Opcode Fuzzy Hash: f825cc49a36603e58b05d30dbcded4ff69a659c0c942629433790640a090c2f4
                    • Instruction Fuzzy Hash: 8011DD75904280DFCB02CF10C6C0B15FBB1FB84324F28C6ADD94A4B656C33AD84ACB61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.394530365.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_cdd000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 16faec8ebc8f0b0f4ba0bc29cecbcfa198c269a92ec6c865a20d8cdbc8ee5d16
                    • Instruction ID: 71eb4a5592e1f9517e1faef8edb8568733d9008956b25587922ea3739ce683ce
                    • Opcode Fuzzy Hash: 16faec8ebc8f0b0f4ba0bc29cecbcfa198c269a92ec6c865a20d8cdbc8ee5d16
                    • Instruction Fuzzy Hash: 6001F731908380AAE7205E16CCC4B66BF98EF41774F19859BEE165F34AC3789C44D6B1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.394530365.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_cdd000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a12ab100ab7cc504ce66e3eb30af3deb7bda3ba4ab11a5d1e8ddd7640da33634
                    • Instruction ID: d71ae7a57ee8808515022994dda6e76f1ffe09a3019ddfb8ee741998b30b48f2
                    • Opcode Fuzzy Hash: a12ab100ab7cc504ce66e3eb30af3deb7bda3ba4ab11a5d1e8ddd7640da33634
                    • Instruction Fuzzy Hash: 50F04F719043449AE7108E15CCC8B62FF98EB91774F18C59AEE195F386C3799844CAB1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.394651074.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d80000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8635bf1681a10df61ec246df2a492cff4129a9acf94246e76cda2c1487057bae
                    • Instruction ID: f200806787875c11b5835ac2a9c36e836ae9a68d9c7ccb63ad05eeb5017cbe1c
                    • Opcode Fuzzy Hash: 8635bf1681a10df61ec246df2a492cff4129a9acf94246e76cda2c1487057bae
                    • Instruction Fuzzy Hash: E012B8F1412B46EBD330CF65E8981893BA1F744328F91420AD1695BAD3D7BC196BCF64
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.400999660.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4ca0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f2f37ae0e17c195dfaa055e8fdd9ad6e3b2b80ea3a586d0619852ce5402367c4
                    • Instruction ID: d428ade4ad1b1b14e8a2f88c95489a1596903e2eeb8256c9f58e0e787890a8f5
                    • Opcode Fuzzy Hash: f2f37ae0e17c195dfaa055e8fdd9ad6e3b2b80ea3a586d0619852ce5402367c4
                    • Instruction Fuzzy Hash: 58D1F530C21A5ACACB00EBA4D851A9DF771EF95300F60C79AE1493B265FB706AC5DF91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.394651074.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_d80000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b5d1b299b9b3552e8960afc4b84889bdebc4ed8880625bd5ad45e597b6331309
                    • Instruction ID: f246e098f9c65537c6ba46b8f433c9737dcdbe64506cd3c999617950424f3748
                    • Opcode Fuzzy Hash: b5d1b299b9b3552e8960afc4b84889bdebc4ed8880625bd5ad45e597b6331309
                    • Instruction Fuzzy Hash: D5A16F32E10219CFCF15EFB5C84499EB7B2FF89300B15816AE505AB2A1EB35E905CB60
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.400999660.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4ca0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 304a13c23b189cbe9228b59fba4e5aeb0795626e2f8057f346dd22523f10f787
                    • Instruction ID: 40a4b74588c2a6549917d14d1e06365f61eed529d5040dac00eec3016ab96502
                    • Opcode Fuzzy Hash: 304a13c23b189cbe9228b59fba4e5aeb0795626e2f8057f346dd22523f10f787
                    • Instruction Fuzzy Hash: 49D1F430C21A5ACACB00EBA5D851A9DF371EF95300F60C79AE1493B264FB706AC5DF91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Execution Graph

                    Execution Coverage:12.2%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0.6%
                    Total number of Nodes:525
                    Total number of Limit Nodes:29
                    execution_graph 28334 4eae3fb 28335 4ea2750 8 API calls 28334->28335 28336 4eae40e 28335->28336 28339 4ea32d8 28336->28339 28338 4eae431 28340 4eae6e0 PostMessageW 28339->28340 28341 4eae74c 28340->28341 28341->28338 27998 4ea0be8 27999 4ea0c15 27998->27999 28000 4ea0c47 27999->28000 28003 4ea0d60 27999->28003 28008 4ea0d70 27999->28008 28005 4ea0d70 28003->28005 28004 4ea0e10 28004->28000 28013 4ea0e28 28005->28013 28017 4ea0e18 28005->28017 28010 4ea0d84 28008->28010 28009 4ea0e10 28009->28000 28011 4ea0e28 10 API calls 28010->28011 28012 4ea0e18 10 API calls 28010->28012 28011->28009 28012->28009 28014 4ea0e39 28013->28014 28021 4ea62f8 28013->28021 28042 4ea62e8 28013->28042 28014->28004 28018 4ea0e39 28017->28018 28019 4ea62e8 10 API calls 28017->28019 28020 4ea62f8 10 API calls 28017->28020 28018->28004 28019->28018 28020->28018 28022 4ea6311 28021->28022 28030 4ea632d 28021->28030 28023 4ea6316 28022->28023 28024 4ea6358 28022->28024 28025 4ea631b 28023->28025 28026 4ea6332 28023->28026 28027 4ea65e4 28024->28027 28024->28030 28028 4ea6542 28025->28028 28029 4ea6324 28025->28029 28026->28030 28034 4ea65ac 28026->28034 28035 4ea6550 28026->28035 28039 4ea645e 28026->28039 28075 4ea58d0 28027->28075 28063 4ea5820 28028->28063 28029->28030 28032 4ea65ba 28029->28032 28030->28039 28081 4ea6a8a 28030->28081 28086 4ea6a88 28030->28086 28071 4ea58a0 28032->28071 28067 4ea5890 28034->28067 28091 4ea5830 28035->28091 28039->28014 28043 4ea62f8 28042->28043 28044 4ea6358 28043->28044 28045 4ea6316 28043->28045 28051 4ea632d 28043->28051 28048 4ea65e4 28044->28048 28044->28051 28046 4ea631b 28045->28046 28047 4ea6332 28045->28047 28049 4ea6542 28046->28049 28050 4ea6324 28046->28050 28047->28051 28055 4ea65ac 28047->28055 28056 4ea6550 28047->28056 28060 4ea645e 28047->28060 28054 4ea58d0 10 API calls 28048->28054 28052 4ea5820 3 API calls 28049->28052 28050->28051 28053 4ea65ba 28050->28053 28051->28060 28061 4ea6a8a 3 API calls 28051->28061 28062 4ea6a88 3 API calls 28051->28062 28052->28060 28057 4ea58a0 3 API calls 28053->28057 28054->28060 28059 4ea5890 3 API calls 28055->28059 28058 4ea5830 8 API calls 28056->28058 28057->28060 28058->28060 28059->28060 28060->28014 28061->28060 28062->28060 28064 4ea582b 28063->28064 28065 4ea6a88 3 API calls 28064->28065 28066 4ea6c9e 28065->28066 28066->28039 28068 4ea589b 28067->28068 28069 4ea6a88 3 API calls 28068->28069 28070 4ead30c 28069->28070 28070->28039 28072 4ea58ab 28071->28072 28073 4ea6a88 3 API calls 28072->28073 28074 4ea9a53 28072->28074 28073->28074 28074->28039 28076 4ea58db 28075->28076 28077 4ea5830 8 API calls 28076->28077 28078 4ea8d68 28077->28078 28079 4ea6a88 3 API calls 28078->28079 28080 4ea8d71 28079->28080 28080->28039 28082 4ea6a9a 28081->28082 28083 4ea6a93 28081->28083 28097 4ea6ab2 28082->28097 28083->28039 28084 4ea6aa0 28084->28039 28087 4ea6a9a 28086->28087 28088 4ea6a93 28086->28088 28090 4ea6ab2 3 API calls 28087->28090 28088->28039 28089 4ea6aa0 28089->28039 28090->28089 28093 4ea583b 28091->28093 28092 4ea8fcc 28092->28039 28093->28092 28141 4ea2750 28093->28141 28095 4ea8dec 28095->28092 28146 4ea5604 28095->28146 28098 4ea6ae8 28097->28098 28100 4ea6ac6 28097->28100 28099 4ea17e0 3 API calls 28098->28099 28104 4ea6aef 28099->28104 28101 4ea6ad4 28100->28101 28105 4ea17e0 28100->28105 28101->28084 28103 4ea6b10 28103->28084 28104->28084 28106 4ea182c 28105->28106 28107 4ea1c6b 28106->28107 28109 4ea1a99 28106->28109 28112 4ea1870 28106->28112 28115 4ea11c8 28107->28115 28109->28103 28110 4ea21e6 28110->28109 28120 4ea6b18 28110->28120 28125 4ea6b28 28110->28125 28112->28109 28112->28110 28130 4ea1540 28112->28130 28117 4ea11d3 28115->28117 28116 4ea8d3c 28116->28109 28118 4ea6b28 2 API calls 28117->28118 28119 4ea6b18 2 API calls 28117->28119 28118->28116 28119->28116 28121 4ea6b6e 28120->28121 28122 4ea6b91 28121->28122 28133 4ea2460 28121->28133 28137 4ea2470 28121->28137 28122->28109 28126 4ea6b6e 28125->28126 28127 4ea6b91 28126->28127 28128 4ea2460 CallWindowProcW 28126->28128 28129 4ea2470 CallWindowProcW 28126->28129 28127->28109 28128->28127 28129->28127 28131 4eac3d8 SendMessageW 28130->28131 28132 4eac444 28131->28132 28132->28112 28134 4ea24b2 28133->28134 28136 4ea24b9 28133->28136 28135 4ea250a CallWindowProcW 28134->28135 28134->28136 28135->28136 28136->28122 28138 4ea24b2 28137->28138 28140 4ea24b9 28137->28140 28139 4ea250a CallWindowProcW 28138->28139 28138->28140 28139->28140 28140->28122 28142 4ea2760 28141->28142 28143 4ea279d 28142->28143 28152 4ea5d48 28142->28152 28180 4ea5d39 28142->28180 28143->28095 28148 4ea560f 28146->28148 28147 4eabd30 28147->28092 28148->28147 28149 4ea2750 8 API calls 28148->28149 28150 4eabd1c 28149->28150 28323 4eaa570 28150->28323 28153 4ea5d81 28152->28153 28160 4ea5e1f 28153->28160 28208 f5e0f0 28153->28208 28217 f5e0d8 28153->28217 28157 4ea5e95 28158 4ea5604 8 API calls 28157->28158 28159 4ea5e9d 28158->28159 28162 4ea5ec4 28159->28162 28245 4ea5614 28159->28245 28225 4ea55f4 28160->28225 28163 4ea2750 8 API calls 28162->28163 28165 4ea5fb4 28162->28165 28164 4ea5f4c 28163->28164 28250 4ea5654 28164->28250 28262 4eacd58 28165->28262 28266 4eacd49 28165->28266 28167 4ea601b 28168 4ea5f5b 28168->28165 28169 4ea5654 CreateWindowExW 28168->28169 28170 4ea5f86 28169->28170 28170->28165 28171 4ea5654 CreateWindowExW 28170->28171 28172 4ea5f97 28171->28172 28255 4ea5674 28172->28255 28174 4ea5fa6 28175 4ea1540 SendMessageW 28174->28175 28175->28165 28181 4ea5d81 28180->28181 28188 4ea5e1f 28181->28188 28204 f5e0f0 3 API calls 28181->28204 28205 f5e0d8 3 API calls 28181->28205 28182 4ea55f4 8 API calls 28183 4ea5e8b 28182->28183 28184 4ea5120 8 API calls 28183->28184 28185 4ea5e95 28184->28185 28186 4ea5604 8 API calls 28185->28186 28187 4ea5e9d 28186->28187 28189 4ea5614 8 API calls 28187->28189 28190 4ea5ec4 28187->28190 28188->28182 28189->28190 28191 4ea5fb4 28190->28191 28192 4ea2750 8 API calls 28190->28192 28206 4eacd58 8 API calls 28191->28206 28207 4eacd49 8 API calls 28191->28207 28193 4ea5f4c 28192->28193 28194 4ea5654 CreateWindowExW 28193->28194 28196 4ea5f5b 28194->28196 28195 4ea601b 28196->28191 28197 4ea5654 CreateWindowExW 28196->28197 28198 4ea5f86 28197->28198 28198->28191 28199 4ea5654 CreateWindowExW 28198->28199 28200 4ea5f97 28199->28200 28201 4ea5674 8 API calls 28200->28201 28202 4ea5fa6 28201->28202 28203 4ea1540 SendMessageW 28202->28203 28203->28191 28204->28188 28205->28188 28206->28195 28207->28195 28210 f5e121 28208->28210 28212 f5e213 28208->28212 28209 f5e12d 28209->28160 28210->28209 28211 f5e16e 28210->28211 28270 f5e438 28210->28270 28273 f5e428 28210->28273 28276 f5ee00 28211->28276 28281 f5edef 28211->28281 28212->28160 28218 f5e0f0 28217->28218 28219 f5e12d 28218->28219 28220 f5e16e 28218->28220 28223 f5e438 2 API calls 28218->28223 28224 f5e428 2 API calls 28218->28224 28219->28160 28221 f5ee00 CreateWindowExW 28220->28221 28222 f5edef CreateWindowExW 28220->28222 28221->28219 28222->28219 28223->28220 28224->28220 28226 4ea55ff 28225->28226 28227 4ea9cd8 28226->28227 28228 4ea5654 CreateWindowExW 28226->28228 28230 4ea5e8b 28226->28230 28229 4ea2750 8 API calls 28227->28229 28228->28227 28229->28230 28231 4ea5120 28230->28231 28232 4ea512b 28231->28232 28233 4ea9f11 28232->28233 28241 4ea9f64 28232->28241 28244 4ea9f98 28232->28244 28319 4ea9704 8 API calls 28232->28319 28234 4ea9f4a 28233->28234 28235 4ea5674 8 API calls 28233->28235 28236 4ea5674 8 API calls 28234->28236 28237 4ea9f3c 28235->28237 28238 4ea9f56 28236->28238 28313 4ea9714 28237->28313 28240 4ea9714 8 API calls 28238->28240 28240->28241 28243 4ea2750 8 API calls 28241->28243 28241->28244 28243->28244 28244->28157 28248 4ea561f 28245->28248 28246 4eac096 28246->28162 28247 4ea2750 8 API calls 28249 4eac166 28247->28249 28248->28246 28248->28247 28249->28162 28251 4ea565f 28250->28251 28252 4ea9d9b 28251->28252 28253 f5ee00 CreateWindowExW 28251->28253 28254 f5edef CreateWindowExW 28251->28254 28252->28168 28253->28252 28254->28252 28257 4ea567f 28255->28257 28256 4eabbde 28256->28174 28257->28256 28258 4ea2750 8 API calls 28257->28258 28259 4eabc38 28258->28259 28260 4eaa548 SendMessageW 28259->28260 28261 4eabc49 28260->28261 28261->28174 28263 4eacd65 28262->28263 28264 4ea5604 8 API calls 28263->28264 28265 4eacd6c 28264->28265 28265->28167 28267 4eacd58 28266->28267 28268 4ea5604 8 API calls 28267->28268 28269 4eacd6c 28268->28269 28269->28167 28286 f593e8 28270->28286 28272 f5e441 28272->28211 28274 f593e8 2 API calls 28273->28274 28275 f5e441 28273->28275 28274->28275 28275->28211 28277 f5ee2a 28276->28277 28278 f5eed1 28277->28278 28302 f5fba8 28277->28302 28305 f5fb98 28277->28305 28282 f5ee2a 28281->28282 28283 f5eed1 28282->28283 28284 f5fba8 CreateWindowExW 28282->28284 28285 f5fb98 CreateWindowExW 28282->28285 28284->28283 28285->28283 28287 f593fb 28286->28287 28288 f59413 28287->28288 28294 f59670 28287->28294 28298 f59660 28287->28298 28288->28272 28289 f59610 GetModuleHandleW 28291 f5963d 28289->28291 28290 f5940b 28290->28288 28290->28289 28291->28272 28295 f59684 28294->28295 28296 f58768 LoadLibraryExW 28295->28296 28297 f596a9 28295->28297 28296->28297 28297->28290 28300 f59670 28298->28300 28299 f596a9 28299->28290 28300->28299 28301 f58768 LoadLibraryExW 28300->28301 28301->28299 28309 f5da04 28302->28309 28304 f5fbdd 28304->28278 28306 f5fba8 28305->28306 28307 f5da04 CreateWindowExW 28306->28307 28308 f5fbdd 28307->28308 28308->28278 28310 f5fbf8 CreateWindowExW 28309->28310 28312 f5fd1c 28310->28312 28312->28304 28314 4ea971f 28313->28314 28315 4eabc38 28314->28315 28316 4ea2750 8 API calls 28314->28316 28320 4eaa548 28315->28320 28316->28315 28319->28233 28321 4eabc60 SendMessageW 28320->28321 28322 4eabc49 28321->28322 28322->28234 28324 4eaa57b 28323->28324 28325 4ea5830 8 API calls 28324->28325 28326 4eabe04 28325->28326 28326->28147 28342 4eaa0f8 28344 4eaa109 28342->28344 28343 4eaa173 28344->28343 28347 4ea9788 28344->28347 28348 4ea9793 28347->28348 28349 4eaa16c 28348->28349 28352 4eab898 28348->28352 28358 4eab897 28348->28358 28364 4eaa504 28352->28364 28355 4eab8bf 28355->28349 28356 4eab8d7 CreateIconFromResourceEx 28357 4eab966 28356->28357 28357->28349 28359 4eaa504 CreateIconFromResourceEx 28358->28359 28360 4eab8b2 28358->28360 28359->28360 28361 4eab8bf 28360->28361 28362 4eab8d7 CreateIconFromResourceEx 28360->28362 28361->28349 28363 4eab966 28362->28363 28363->28349 28365 4eab8e8 CreateIconFromResourceEx 28364->28365 28366 4eab8b2 28365->28366 28366->28355 28366->28356 28563 4eac4d8 28564 4ea2750 8 API calls 28563->28564 28565 4eac4e8 28564->28565 28569 f5fe02 28565->28569 28573 f5fe10 28565->28573 28566 4eac4fa 28570 f5fe10 28569->28570 28576 f5da3c 28570->28576 28574 f5da3c SetWindowLongW 28573->28574 28575 f5fe28 28574->28575 28575->28566 28577 f5fe40 SetWindowLongW 28576->28577 28578 f5fe28 28577->28578 28578->28566 28579 4ea25d8 28580 4ea25e8 28579->28580 28584 4ea8888 28580->28584 28590 4ea8898 28580->28590 28581 4ea2611 28585 4ea88cd 28584->28585 28596 4ea3660 28585->28596 28589 4ea8929 28589->28581 28591 4ea88cd 28590->28591 28592 4ea3660 9 API calls 28591->28592 28593 4ea8922 28592->28593 28594 4ea7240 8 API calls 28593->28594 28595 4ea8929 28594->28595 28595->28581 28601 4ea368c 28596->28601 28597 4ea3a87 28610 4ea7240 28597->28610 28599 4ea2750 8 API calls 28600 4ea3a64 28599->28600 28602 4ea32d8 PostMessageW 28600->28602 28608 4ea38bc 28601->28608 28620 4ea3238 28601->28620 28602->28597 28603 4ea373d 28604 4ea2750 8 API calls 28603->28604 28609 4ea37e5 28603->28609 28605 4ea37af 28604->28605 28606 4ea2750 8 API calls 28605->28606 28606->28609 28607 4ea2750 8 API calls 28607->28608 28608->28597 28608->28599 28609->28607 28611 4ea724b 28610->28611 28612 4ea8a8d 28611->28612 28613 4ea8ac5 28611->28613 28619 4ea8a94 28611->28619 28614 4ea2750 8 API calls 28612->28614 28615 4ea8aea 28613->28615 28616 4ea8b16 28613->28616 28614->28619 28618 4ea2750 8 API calls 28615->28618 28617 4ea2750 8 API calls 28616->28617 28617->28619 28618->28619 28619->28589 28621 4ea3243 28620->28621 28623 4ea2750 8 API calls 28621->28623 28624 4ea3bf7 28621->28624 28625 4ea3bb9 28621->28625 28622 4ea2750 8 API calls 28622->28625 28623->28625 28624->28603 28625->28622 28625->28624 28327 f592f0 28329 f593e8 2 API calls 28327->28329 28328 f592ff 28329->28328 28367 f5b6d0 28368 f5b736 28367->28368 28372 f5bc98 28368->28372 28375 f5bc88 28368->28375 28369 f5b7e5 28378 f5a14c 28372->28378 28376 f5bcc6 28375->28376 28377 f5a14c DuplicateHandle 28375->28377 28376->28369 28377->28376 28379 f5bd00 DuplicateHandle 28378->28379 28380 f5bcc6 28379->28380 28380->28369 28330 4ea9e2c 28332 4ea2460 CallWindowProcW 28330->28332 28333 4ea2470 CallWindowProcW 28330->28333 28331 4ea9e35 28332->28331 28333->28331 28381 f53f98 28382 f53fa9 28381->28382 28387 4ea49a8 28382->28387 28391 4ea49e1 28382->28391 28396 4ea4999 28382->28396 28383 f53fbb 28388 4ea49a7 28387->28388 28400 4ea353c 28388->28400 28392 4ea49a7 28391->28392 28395 4ea49ef 28391->28395 28393 4ea353c 12 API calls 28392->28393 28394 4ea49da 28393->28394 28394->28383 28395->28383 28397 4ea49a7 28396->28397 28398 4ea353c 12 API calls 28397->28398 28399 4ea49da 28398->28399 28399->28383 28401 4ea3547 28400->28401 28404 4ea357c 28401->28404 28403 4ea4aed 28412 4ea3587 28404->28412 28405 4ea521e 28406 4ea5374 28405->28406 28408 4ea4ee4 11 API calls 28405->28408 28407 4ea5383 28406->28407 28409 4ea4f1c OleInitialize 28406->28409 28411 4ea539b 28407->28411 28419 4ea4f1c 28407->28419 28408->28406 28409->28407 28411->28403 28412->28405 28412->28411 28414 4ea4ee4 28412->28414 28415 4ea4eef 28414->28415 28423 4ea59c8 28415->28423 28438 4ea59a8 28415->28438 28416 4ea55ab 28416->28405 28420 4ea4f27 28419->28420 28422 4eaf091 28420->28422 28475 4eadc44 28420->28475 28422->28411 28426 4ea59ee 28423->28426 28424 4ea5a02 28424->28416 28425 4ea5adf 28427 4ea5aed 28425->28427 28453 f5c3d1 28425->28453 28460 f5c3e0 28425->28460 28426->28424 28426->28425 28431 4ea5b42 28426->28431 28428 4ea5b3d 28427->28428 28429 4ea2750 8 API calls 28427->28429 28428->28416 28430 4ea5b15 28429->28430 28467 4ea50d4 28430->28467 28431->28428 28433 4ea2750 8 API calls 28431->28433 28434 4ea5be7 28433->28434 28434->28428 28435 4ea5120 8 API calls 28434->28435 28435->28428 28439 4ea59ad 28438->28439 28440 4ea5a02 28439->28440 28441 4ea5adf 28439->28441 28447 4ea5b42 28439->28447 28440->28416 28442 4ea5aed 28441->28442 28451 f5c3d1 9 API calls 28441->28451 28452 f5c3e0 9 API calls 28441->28452 28443 4ea2750 8 API calls 28442->28443 28446 4ea5b3d 28442->28446 28444 4ea5b15 28443->28444 28445 4ea50d4 SendMessageW 28444->28445 28445->28446 28446->28416 28447->28446 28448 4ea2750 8 API calls 28447->28448 28449 4ea5be7 28448->28449 28449->28446 28450 4ea5120 8 API calls 28449->28450 28450->28446 28451->28442 28452->28442 28454 f5c40e 28453->28454 28457 f5c4df 28454->28457 28459 4ea2750 8 API calls 28454->28459 28470 4ea2740 28454->28470 28455 f5c486 28456 f5c4da KiUserCallbackDispatcher 28455->28456 28456->28457 28459->28455 28461 f5c40e 28460->28461 28464 f5c4df 28461->28464 28465 4ea2740 8 API calls 28461->28465 28466 4ea2750 8 API calls 28461->28466 28462 f5c486 28463 f5c4da KiUserCallbackDispatcher 28462->28463 28463->28464 28465->28462 28466->28462 28468 4ead240 SendMessageW 28467->28468 28469 4ead2ac 28468->28469 28469->28428 28471 4ea2760 28470->28471 28472 4ea279d 28471->28472 28473 4ea5d48 8 API calls 28471->28473 28474 4ea5d39 8 API calls 28471->28474 28472->28455 28473->28472 28474->28472 28476 4eadc4f 28475->28476 28477 4eaf3ab 28476->28477 28479 4eadc60 28476->28479 28477->28422 28480 4eaf3e0 OleInitialize 28479->28480 28481 4eaf444 28480->28481 28481->28477 28482 f56758 28487 f56344 28482->28487 28484 f56766 28491 4ea4151 28484->28491 28485 f567cc 28488 f5634f 28487->28488 28495 f56394 28488->28495 28490 f5688d 28490->28484 28540 4ea4180 28491->28540 28544 4ea4171 28491->28544 28492 4ea4166 28492->28485 28496 f5639f 28495->28496 28499 f563c4 28496->28499 28498 f56962 28498->28490 28500 f563cf 28499->28500 28503 f563f4 28500->28503 28502 f56a62 28502->28498 28505 f563ff 28503->28505 28504 f571bc 28504->28502 28505->28504 28508 f5b406 28505->28508 28513 f5b408 28505->28513 28509 f5b408 28508->28509 28510 f5b44d 28509->28510 28518 f5b5b8 28509->28518 28522 f5b5a9 28509->28522 28510->28504 28514 f5b429 28513->28514 28515 f5b44d 28514->28515 28516 f5b5a9 10 API calls 28514->28516 28517 f5b5b8 10 API calls 28514->28517 28515->28504 28516->28515 28517->28515 28520 f5b5c5 28518->28520 28519 f5b5ff 28519->28510 28520->28519 28526 f5a0ec 28520->28526 28523 f5b5b8 28522->28523 28524 f5b5ff 28523->28524 28525 f5a0ec 10 API calls 28523->28525 28524->28510 28525->28524 28527 f5a0f7 28526->28527 28529 f5c2f8 28527->28529 28530 f5b904 28527->28530 28529->28529 28531 f5b90f 28530->28531 28532 f5c367 28531->28532 28533 f563f4 10 API calls 28531->28533 28536 f5c3d1 9 API calls 28532->28536 28537 f5c3e0 9 API calls 28532->28537 28533->28532 28534 f5c375 28538 f5e0f0 3 API calls 28534->28538 28539 f5e0d8 3 API calls 28534->28539 28535 f5c3a0 28535->28529 28536->28534 28537->28534 28538->28535 28539->28535 28542 4ea41a7 28540->28542 28541 4ea4284 28541->28541 28542->28541 28548 4ea3474 28542->28548 28546 4ea41a7 28544->28546 28545 4ea4284 28545->28545 28546->28545 28547 4ea3474 CreateActCtxA 28546->28547 28547->28545 28549 4ea4600 CreateActCtxA 28548->28549 28551 4ea46c3 28549->28551 28552 6c53168 28553 6c531b6 GetSystemTimes 28552->28553 28554 6c531f3 28553->28554 28555 4ea3904 28556 4ea390d 28555->28556 28559 4ea392b 28555->28559 28557 4ea2750 8 API calls 28556->28557 28556->28559 28557->28559 28558 4ea3a87 28559->28558 28560 4ea2750 8 API calls 28559->28560 28561 4ea3a64 28560->28561 28562 4ea32d8 PostMessageW 28561->28562 28562->28558

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 217 6c53168-6c531f1 GetSystemTimes 219 6c531f3-6c531f9 217->219 220 6c531fa-6c5321b 217->220 219->220
                    APIs
                    • GetSystemTimes.KERNEL32(?,?,?), ref: 06C531E4
                    Memory Dump Source
                    • Source File: 00000001.00000002.686088743.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: true
                    • Associated: 00000001.00000002.685898407.0000000006C40000.00000004.08000000.00040000.00000000.sdmpDownload File
                    • Associated: 00000001.00000002.685898407.0000000006C4E000.00000004.08000000.00040000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_6c40000_SAaX2wNRn2.jbxd
                    Yara matches
                    Similarity
                    • API ID: SystemTimes
                    • String ID:
                    • API String ID: 375623090-0
                    • Opcode ID: 7236aaba79f642e968c110a2df5723908a957d49032e1dc12f48fff09ded249c
                    • Instruction ID: 25de8678383b7ea5f4570854663de728b5f544e73d5c291d816516e9c7d7c98f
                    • Opcode Fuzzy Hash: 7236aaba79f642e968c110a2df5723908a957d49032e1dc12f48fff09ded249c
                    • Instruction Fuzzy Hash: 8321E4B1D012099FCB40CFA9D984BDEFBF4EF58320F14806AE808AB241D3759A44CBA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 f5d988-f5d9b5 2 f5d9b7-f5d9bb 0->2 3 f5da0f-f5da1d 0->3 4 f5f7a0-f5f802 2->4 5 f5d9e4-f5fc5e 3->5 6 f5da1f-f5da27 3->6 12 f5f804-f5f80a 4->12 13 f5f80b-f5f828 4->13 14 f5fc60-f5fc66 5->14 15 f5fc69-f5fc70 5->15 6->4 11 f5fee0-f5fee7 call f5da54 6->11 12->13 14->15 17 f5fc72-f5fc78 15->17 18 f5fc7b-f5fcb3 15->18 17->18 22 f5fcbb-f5fd1a CreateWindowExW 18->22 23 f5fd23-f5fd5b 22->23 24 f5fd1c-f5fd22 22->24 28 f5fd5d-f5fd60 23->28 29 f5fd68 23->29 24->23 28->29 29->11
                    Memory Dump Source
                    • Source File: 00000001.00000002.658748532.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_f50000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 71c5066210639441b34873c593397e5ba79b1189b58c353b4ff7704b23419ee5
                    • Instruction ID: 3d280de4f99192c25c82eb0c1e6a27b4dcb86200c337de24af4bcf26290d2ece
                    • Opcode Fuzzy Hash: 71c5066210639441b34873c593397e5ba79b1189b58c353b4ff7704b23419ee5
                    • Instruction Fuzzy Hash: 4C8157B1C043499FCB11CFA9C894ADEBFB1BF49310F24856AE804AB251D774A949DFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 30 f593e8-f593fd call f58704 33 f59413-f59417 30->33 34 f593ff 30->34 35 f59419-f59423 33->35 36 f5942b-f5946c 33->36 83 f59405 call f59670 34->83 84 f59405 call f59660 34->84 35->36 41 f5946e-f59476 36->41 42 f59479-f59487 36->42 37 f5940b-f5940d 37->33 38 f59548-f59608 37->38 78 f59610-f5963b GetModuleHandleW 38->78 79 f5960a-f5960d 38->79 41->42 44 f59489-f5948e 42->44 45 f594ab-f594ad 42->45 47 f59490-f59497 call f58710 44->47 48 f59499 44->48 46 f594b0-f594b7 45->46 50 f594c4-f594cb 46->50 51 f594b9-f594c1 46->51 49 f5949b-f594a9 47->49 48->49 49->46 55 f594cd-f594d5 50->55 56 f594d8-f594e1 call f58720 50->56 51->50 55->56 61 f594e3-f594eb 56->61 62 f594ee-f594f3 56->62 61->62 63 f594f5-f594fc 62->63 64 f59511-f59515 62->64 63->64 66 f594fe-f5950e call f58730 call f58740 63->66 85 f59518 call f59967 64->85 86 f59518 call f59968 64->86 66->64 67 f5951b-f5951e 71 f59541-f59547 67->71 72 f59520-f5953e 67->72 72->71 80 f59644-f59658 78->80 81 f5963d-f59643 78->81 79->78 81->80 83->37 84->37 85->67 86->67
                    APIs
                    • GetModuleHandleW.KERNEL32(00000000), ref: 00F5962E
                    Memory Dump Source
                    • Source File: 00000001.00000002.658748532.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_f50000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: HandleModule
                    • String ID:
                    • API String ID: 4139908857-0
                    • Opcode ID: 37405ac2181f56e2c60958c914a2e57fb42ab01e9a7c32ac13c4b1dbd7865718
                    • Instruction ID: d8ab6b3c7d584ed3ebbbb1b308b9ad1bd9333e5d04ae53ab3bc96856b5ca7192
                    • Opcode Fuzzy Hash: 37405ac2181f56e2c60958c914a2e57fb42ab01e9a7c32ac13c4b1dbd7865718
                    • Instruction Fuzzy Hash: 78713870A00B058FDB24DF29D44175ABBF1FF88315F108A2DD98AD7A50DB74E80ADB90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 87 f5fbec-f5fc5e 88 f5fc60-f5fc66 87->88 89 f5fc69-f5fc70 87->89 88->89 90 f5fc72-f5fc78 89->90 91 f5fc7b-f5fcb3 89->91 90->91 92 f5fcbb-f5fd1a CreateWindowExW 91->92 93 f5fd23-f5fd5b 92->93 94 f5fd1c-f5fd22 92->94 98 f5fd5d-f5fd60 93->98 99 f5fd68 93->99 94->93 98->99 100 f5fee0-f5fee7 call f5da54 99->100
                    APIs
                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00F5FD0A
                    Memory Dump Source
                    • Source File: 00000001.00000002.658748532.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_f50000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: CreateWindow
                    • String ID:
                    • API String ID: 716092398-0
                    • Opcode ID: 48dcc2cc19e321a6942b61267a80a5ca9a57bdbc591c7fffbfa81a1a18e964e8
                    • Instruction ID: 3630f444d5255d1040edc48570e28f50db5e260e50f110f1e22bb26e1782cca6
                    • Opcode Fuzzy Hash: 48dcc2cc19e321a6942b61267a80a5ca9a57bdbc591c7fffbfa81a1a18e964e8
                    • Instruction Fuzzy Hash: 0751A1B1D103099FDB14CFA9D884ADEBBB5FF48310F24812AE819AB210D774A949DF90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 103 4ea45f4-4ea45fd 104 4ea45da 103->104 105 4ea45ff-4ea467b 103->105 106 4ea45b8-4ea45c1 104->106 107 4ea45dc-4ea45eb 104->107 108 4ea4683-4ea46c1 CreateActCtxA 105->108 109 4ea45ca-4ea45d9 106->109 110 4ea45c3-4ea45c9 106->110 111 4ea46ca-4ea4724 108->111 112 4ea46c3-4ea46c9 108->112 109->104 110->109 120 4ea4733-4ea4737 111->120 121 4ea4726-4ea4729 111->121 112->111 122 4ea4748 120->122 123 4ea4739-4ea4745 120->123 121->120 125 4ea4749 122->125 123->122 125->125
                    APIs
                    • CreateActCtxA.KERNEL32(?), ref: 04EA46B1
                    Memory Dump Source
                    • Source File: 00000001.00000002.680759585.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4ea0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: Create
                    • String ID:
                    • API String ID: 2289755597-0
                    • Opcode ID: 575396bf87bc70df82b4059a1c417543e72fed130e46e8e1feca99c88fbd9bfe
                    • Instruction ID: 842557a3c332044bde4fafe566d5cfa48c01a7149e64b22b2e859a840633fae1
                    • Opcode Fuzzy Hash: 575396bf87bc70df82b4059a1c417543e72fed130e46e8e1feca99c88fbd9bfe
                    • Instruction Fuzzy Hash: 454104B1C00218CFDB24DFA9C8847DEBBF5BF45314F24846AD409AB251D7B5A98ADF90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 126 f5da04-f5fc5e 128 f5fc60-f5fc66 126->128 129 f5fc69-f5fc70 126->129 128->129 130 f5fc72-f5fc78 129->130 131 f5fc7b-f5fd1a CreateWindowExW 129->131 130->131 133 f5fd23-f5fd5b 131->133 134 f5fd1c-f5fd22 131->134 138 f5fd5d-f5fd60 133->138 139 f5fd68-f5fee7 call f5da54 133->139 134->133 138->139
                    APIs
                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00F5FD0A
                    Memory Dump Source
                    • Source File: 00000001.00000002.658748532.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_f50000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: CreateWindow
                    • String ID:
                    • API String ID: 716092398-0
                    • Opcode ID: de927895d6d6ed167d1290f340959068cf705480049d837efb93601c1c3787bc
                    • Instruction ID: 56608e52879a6e26f8f8bbc6987a185ac6175793ba5a42266749c4c503fbf309
                    • Opcode Fuzzy Hash: de927895d6d6ed167d1290f340959068cf705480049d837efb93601c1c3787bc
                    • Instruction Fuzzy Hash: A551A2B1D00309DFDB14CF99C884ADEBBB5BF48310F24816AE919AB210D774A949DF90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 143 4ea3474-4ea46c1 CreateActCtxA 146 4ea46ca-4ea4724 143->146 147 4ea46c3-4ea46c9 143->147 154 4ea4733-4ea4737 146->154 155 4ea4726-4ea4729 146->155 147->146 156 4ea4748 154->156 157 4ea4739-4ea4745 154->157 155->154 159 4ea4749 156->159 157->156 159->159
                    APIs
                    • CreateActCtxA.KERNEL32(?), ref: 04EA46B1
                    Memory Dump Source
                    • Source File: 00000001.00000002.680759585.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4ea0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: Create
                    • String ID:
                    • API String ID: 2289755597-0
                    • Opcode ID: 0ec2322d21632d8dbbd21c1d0e303924b42aae8f7eb990c486bdb6c8e0ba7f08
                    • Instruction ID: d5ce657768a3a565dc3db29f98fd5824255f9eea25d5e5dedf16ff31e96baf43
                    • Opcode Fuzzy Hash: 0ec2322d21632d8dbbd21c1d0e303924b42aae8f7eb990c486bdb6c8e0ba7f08
                    • Instruction Fuzzy Hash: D941F2B1C0021CCFDB24DFA9C8447DDBBB5BF49304F24806AD409AB250D7B56949DF90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 160 4ea2470-4ea24ac 161 4ea255c-4ea257c 160->161 162 4ea24b2-4ea24b7 160->162 168 4ea257f-4ea258c 161->168 163 4ea250a-4ea2542 CallWindowProcW 162->163 164 4ea24b9-4ea24f0 162->164 166 4ea254b-4ea255a 163->166 167 4ea2544-4ea254a 163->167 171 4ea24f9-4ea2508 164->171 172 4ea24f2-4ea24f8 164->172 166->168 167->166 171->168 172->171
                    APIs
                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 04EA2531
                    Memory Dump Source
                    • Source File: 00000001.00000002.680759585.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4ea0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: CallProcWindow
                    • String ID:
                    • API String ID: 2714655100-0
                    • Opcode ID: f7e48fda792ba6a023b18014e010119ececc9f1ef92dc31f2a8d523fe9e1a328
                    • Instruction ID: 138c76c002e470c5a6ece44621aa0ecf8e1c6963a0a233b6443f0674a99943e7
                    • Opcode Fuzzy Hash: f7e48fda792ba6a023b18014e010119ececc9f1ef92dc31f2a8d523fe9e1a328
                    • Instruction Fuzzy Hash: CA41E4B5A003059FDB14CF99C888BAABBF5FF88314F248499D519AB321D774E841CBA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 174 4eab898-4eab8bd call 4eaa504 177 4eab8bf-4eab8cf call 4eab358 174->177 178 4eab8d2-4eab964 CreateIconFromResourceEx 174->178 182 4eab96d-4eab98a 178->182 183 4eab966-4eab96c 178->183 183->182
                    Memory Dump Source
                    • Source File: 00000001.00000002.680759585.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4ea0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: CreateFromIconResource
                    • String ID:
                    • API String ID: 3668623891-0
                    • Opcode ID: cc853744a8e3a871bdbfafe88acaed6092bdf8dfe516ea73765c9ad83f9aacd3
                    • Instruction ID: 09d358a2af35a426d6f86f68fc4f24cc9ce697927a1e846e59bd5b2195cc6327
                    • Opcode Fuzzy Hash: cc853744a8e3a871bdbfafe88acaed6092bdf8dfe516ea73765c9ad83f9aacd3
                    • Instruction Fuzzy Hash: 76319CB29003499FDB11CFA9C840AEEBFF4EF09310F14806AE554AB221C335E965DFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 186 4eaa4f8-4eaa505 188 4eaa4cd-4eaa4e8 186->188 189 4eaa507-4eaa50b 186->189 194 4eaa4ea-4eab7d9 188->194 195 4eaa4bd-4eaa4bf 188->195 190 4eab8e8-4eab964 CreateIconFromResourceEx 189->190 192 4eab96d-4eab98a 190->192 193 4eab966-4eab96c 190->193 193->192 200 4eab7db-4eab7e1 194->200 201 4eab7e2-4eab7ff 194->201 195->188 200->201
                    APIs
                    • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,04EAB8B2,?,?,?,?,?), ref: 04EAB957
                    Memory Dump Source
                    • Source File: 00000001.00000002.680759585.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4ea0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: CreateFromIconResource
                    • String ID:
                    • API String ID: 3668623891-0
                    • Opcode ID: 8113003c6406c8f1b1c8676267b7a5ab0a6563343e456b77f48b6ad0532543d8
                    • Instruction ID: f62f96ff7a13588f767e1ed386eff3e993dbb0a10dc0c9677930036d766d91db
                    • Opcode Fuzzy Hash: 8113003c6406c8f1b1c8676267b7a5ab0a6563343e456b77f48b6ad0532543d8
                    • Instruction Fuzzy Hash: 4D2187B28002499FDB10CFAAC854BDEBFF4EF58314F14845AE555AB210C338E954EFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 204 f5a14c-f5bd94 DuplicateHandle 206 f5bd96-f5bd9c 204->206 207 f5bd9d-f5bdba 204->207 206->207
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00F5BCC6,?,?,?,?,?), ref: 00F5BD87
                    Memory Dump Source
                    • Source File: 00000001.00000002.658748532.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_f50000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: 3a42ebbe1c6ffe97b63d13ee4466ac9ac7fd5fa328bd8b0634e33209d4ef8e0a
                    • Instruction ID: ef3524945620e48073c1c366a151b26ab96c8ab4b085d8c25ac39bde73a7979f
                    • Opcode Fuzzy Hash: 3a42ebbe1c6ffe97b63d13ee4466ac9ac7fd5fa328bd8b0634e33209d4ef8e0a
                    • Instruction Fuzzy Hash: 0021E3B5900249AFDB10CFAAD984AEEBFF4EB48320F14841AE915A7310D374A954DFA4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 211 f5bcf9-f5bd94 DuplicateHandle 212 f5bd96-f5bd9c 211->212 213 f5bd9d-f5bdba 211->213 212->213
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00F5BCC6,?,?,?,?,?), ref: 00F5BD87
                    Memory Dump Source
                    • Source File: 00000001.00000002.658748532.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_f50000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: ade2f81cd15212cb40ff25fa647c2fd0df325b8bc96827d97e4549ebb817a67a
                    • Instruction ID: 06b71c1a4dada892ea999b74aa512ccb498d92a724083b14be3578d7051263de
                    • Opcode Fuzzy Hash: ade2f81cd15212cb40ff25fa647c2fd0df325b8bc96827d97e4549ebb817a67a
                    • Instruction Fuzzy Hash: 6921F5B5D00209DFDB00CFAAD584ADEBBF5FB48320F14841AE954A7310C378A954DF64
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 222 4eaa504-4eab964 CreateIconFromResourceEx 224 4eab96d-4eab98a 222->224 225 4eab966-4eab96c 222->225 225->224
                    APIs
                    • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,04EAB8B2,?,?,?,?,?), ref: 04EAB957
                    Memory Dump Source
                    • Source File: 00000001.00000002.680759585.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4ea0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: CreateFromIconResource
                    • String ID:
                    • API String ID: 3668623891-0
                    • Opcode ID: 481099c7a4602332bfe5db108a395d812904f0fa7576fa82fed68c9a7d02d42c
                    • Instruction ID: b586ab05ae9438d0f8760a882a2d2a9953dd3a47f90c079ac0de54831fbe89a0
                    • Opcode Fuzzy Hash: 481099c7a4602332bfe5db108a395d812904f0fa7576fa82fed68c9a7d02d42c
                    • Instruction Fuzzy Hash: 011126B29002499FDB10CFAAC844BDEBFF8EB58320F14841AE955B7210C374A954DFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 228 f58768-f59890 230 f59892-f59895 228->230 231 f59898-f598c7 LoadLibraryExW 228->231 230->231 232 f598d0-f598ed 231->232 233 f598c9-f598cf 231->233 233->232
                    APIs
                    • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,00F596A9,00000800,00000000,00000000), ref: 00F598BA
                    Memory Dump Source
                    • Source File: 00000001.00000002.658748532.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_f50000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 79f08809ba72119ed1c206527f0660895baeeb7fad23ff62a297cecafcda08a7
                    • Instruction ID: b026c17729fef0cdfbef62d9e9f05018e2f260575d5d6ac383a0fbff0a1358aa
                    • Opcode Fuzzy Hash: 79f08809ba72119ed1c206527f0660895baeeb7fad23ff62a297cecafcda08a7
                    • Instruction Fuzzy Hash: 561133B2D002098FDB14CF9AC444BDEBBF4EB48321F14842ED919B7600C3B4A948DFA4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 236 f59849-f59890 237 f59892-f59895 236->237 238 f59898-f598c7 LoadLibraryExW 236->238 237->238 239 f598d0-f598ed 238->239 240 f598c9-f598cf 238->240 240->239
                    APIs
                    • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,00F596A9,00000800,00000000,00000000), ref: 00F598BA
                    Memory Dump Source
                    • Source File: 00000001.00000002.658748532.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_f50000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 4fb2d06184a39136cb9a68de17286bdd17335b49b6d3c27b019d99e17d37571f
                    • Instruction ID: ecfd2f327ec339adb05e5c18d2a9749d23f5e1df5c751380d34d36063653fbc4
                    • Opcode Fuzzy Hash: 4fb2d06184a39136cb9a68de17286bdd17335b49b6d3c27b019d99e17d37571f
                    • Instruction Fuzzy Hash: E711E4B6D00309CFDB14CF9AD444ADEBBF5AB58321F54842AD915A7600C3B4A549DFA4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • PostMessageW.USER32(?,00D953E8,00000000,?), ref: 04EAE73D
                    Memory Dump Source
                    • Source File: 00000001.00000002.680759585.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4ea0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: MessagePost
                    • String ID:
                    • API String ID: 410705778-0
                    • Opcode ID: 6dcd4bdf8eed039ab7f77e89b41840e134f86dce402eb1f67a85fe2a39fccbe9
                    • Instruction ID: 7ec81eb9b93fd50d6d59f7618c113a7d8c5438654704d318e1c1600ae392289f
                    • Opcode Fuzzy Hash: 6dcd4bdf8eed039ab7f77e89b41840e134f86dce402eb1f67a85fe2a39fccbe9
                    • Instruction Fuzzy Hash: 581158B18003098FDB10CF9AC885BEEBBF4FF58320F24851AE414A7240C379A995CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • PostMessageW.USER32(?,00D953E8,00000000,?), ref: 04EAE73D
                    Memory Dump Source
                    • Source File: 00000001.00000002.680759585.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4ea0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: MessagePost
                    • String ID:
                    • API String ID: 410705778-0
                    • Opcode ID: 0a6d4e80544b3590b1ec7ed73c732bc445a3191826ed0ae986b3d452ed0c17fb
                    • Instruction ID: 72bc14d0ea1937042b50671a7e4b428005e56689b19cef7c4d3fcd82c0cad88f
                    • Opcode Fuzzy Hash: 0a6d4e80544b3590b1ec7ed73c732bc445a3191826ed0ae986b3d452ed0c17fb
                    • Instruction Fuzzy Hash: AA116AB18003099FDB10CF9AC885BEEBBF8FF58320F14841AE454A7200D374A994DFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • SendMessageW.USER32(?,00000018,00000001,?), ref: 04EAD29D
                    Memory Dump Source
                    • Source File: 00000001.00000002.680759585.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4ea0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: e4bb59f8e9e06df7821efd6dbe40f4bfbd19b6e1f3998f63afc62558a6a21225
                    • Instruction ID: 76196b2bc359c0d43d3683ff16a22c0321b205fe93b68b5fd4eb74f2b1428e58
                    • Opcode Fuzzy Hash: e4bb59f8e9e06df7821efd6dbe40f4bfbd19b6e1f3998f63afc62558a6a21225
                    • Instruction Fuzzy Hash: 3C1125B58003099FDB10DF9AC884BDEBFF5EB58324F10881AE415A7600C374A554CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,00F5FE28,?,?,?,?), ref: 00F5FE9D
                    Memory Dump Source
                    • Source File: 00000001.00000002.658748532.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_f50000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: LongWindow
                    • String ID:
                    • API String ID: 1378638983-0
                    • Opcode ID: 8f05c31f8557789a1179afc08b7c84d1b583bb2da12586a87bc41fccc24a08dd
                    • Instruction ID: e7d6aaa0e94b063990ac59840a0af172a03ecc33203237cf28f0d7b125a2c198
                    • Opcode Fuzzy Hash: 8f05c31f8557789a1179afc08b7c84d1b583bb2da12586a87bc41fccc24a08dd
                    • Instruction Fuzzy Hash: 681133B18003098FCB10CF9AD585BDEBBF4EB48324F20846AD819A7201C3B4A949CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • SendMessageW.USER32(?,?,?,?,?,?,?,?,?,00000000), ref: 04EABCBD
                    Memory Dump Source
                    • Source File: 00000001.00000002.680759585.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4ea0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: dec1d124e1487c687465512cabd0770fd8860f436e63076a6c61889a9b6cfed3
                    • Instruction ID: c9e3438e0eb7bd32af3f1801c320001a497957b1a447864a92128903c96c44a3
                    • Opcode Fuzzy Hash: dec1d124e1487c687465512cabd0770fd8860f436e63076a6c61889a9b6cfed3
                    • Instruction Fuzzy Hash: 5011E3B59003499FDB10CF9AC584BDEBBF8EB48324F10845AE555A7600C374B994CFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • SendMessageW.USER32(?,0000020A,?,?,?,?,?,?,04EA226A,?,00000000,?), ref: 04EAC435
                    Memory Dump Source
                    • Source File: 00000001.00000002.680759585.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4ea0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: 1910ffddef205f46aa7589b53a51fdd8d44bbe1adb2e7ac8387fac835c52e27e
                    • Instruction ID: 2573ff3ec2562c3f27c7d1b52a9b82b8c12d60e4ed8e750f9634453b9e4c56dd
                    • Opcode Fuzzy Hash: 1910ffddef205f46aa7589b53a51fdd8d44bbe1adb2e7ac8387fac835c52e27e
                    • Instruction Fuzzy Hash: 52110AB58003499FDB10CF99C944BDEBBF4EB58314F208459D455A7700C374A954CFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • SendMessageW.USER32(?,00000018,00000001,?), ref: 04EAD29D
                    Memory Dump Source
                    • Source File: 00000001.00000002.680759585.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4ea0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: 271bd65eff08054e259a7c53d813e32746629c58af55be6fb0478f7288b50cff
                    • Instruction ID: 912ba31417e1873fa718b29dc51035619c1efa2185a04a54d0b5c84a78c11b73
                    • Opcode Fuzzy Hash: 271bd65eff08054e259a7c53d813e32746629c58af55be6fb0478f7288b50cff
                    • Instruction Fuzzy Hash: A511F5B59003499FDB10CF9AC984BDEBBF8EB58324F10841AE815B7600C374A994CFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetModuleHandleW.KERNEL32(00000000), ref: 00F5962E
                    Memory Dump Source
                    • Source File: 00000001.00000002.658748532.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_f50000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: HandleModule
                    • String ID:
                    • API String ID: 4139908857-0
                    • Opcode ID: d74c4aafd0329450b29d6d1a00dcb4463f2a42e964056dcba22004b1a0ed56b3
                    • Instruction ID: 21d656726059cc37f4d2793b64af0d0d72b1b30cc786b3e97ce24b595811d0ec
                    • Opcode Fuzzy Hash: d74c4aafd0329450b29d6d1a00dcb4463f2a42e964056dcba22004b1a0ed56b3
                    • Instruction Fuzzy Hash: 2011E0B6C006498FCB14CF9AC444BDEFBF4AF88324F14842AD819A7600D3B4A549CFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,00F5FE28,?,?,?,?), ref: 00F5FE9D
                    Memory Dump Source
                    • Source File: 00000001.00000002.658748532.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_f50000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: LongWindow
                    • String ID:
                    • API String ID: 1378638983-0
                    • Opcode ID: 602452f7ca72e982d6f1c4bbcf1afbc668022bbfb3659fcdfb188d5061d41352
                    • Instruction ID: 7c9c778e97db5146488a9cccbc1def1fc189fa0505cfef3621e867743f61320e
                    • Opcode Fuzzy Hash: 602452f7ca72e982d6f1c4bbcf1afbc668022bbfb3659fcdfb188d5061d41352
                    • Instruction Fuzzy Hash: 851136B18002498FDB10CF9AC585BDEBBF8EB48324F10846AE915B7301C374A948CFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • OleInitialize.OLE32(00000000), ref: 04EAF435
                    Memory Dump Source
                    • Source File: 00000001.00000002.680759585.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4ea0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: Initialize
                    • String ID:
                    • API String ID: 2538663250-0
                    • Opcode ID: 1ab780a8f039a4a570b9c9c46ef61a9a2d0c31cbb25361f642e8eaa0538cbf73
                    • Instruction ID: 854c30449068332013217a4bea7360177c4e5bd6670462f9238f32a65f1eeed5
                    • Opcode Fuzzy Hash: 1ab780a8f039a4a570b9c9c46ef61a9a2d0c31cbb25361f642e8eaa0538cbf73
                    • Instruction Fuzzy Hash: 801115B19003488FDB10CF9AD484BDEBBF4EB48324F14845AD459BB700D374A944CFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • SendMessageW.USER32(?,0000020A,?,?,?,?,?,?,04EA226A,?,00000000,?), ref: 04EAC435
                    Memory Dump Source
                    • Source File: 00000001.00000002.680759585.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4ea0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: a12d118db407d409e24a857823dd06562f533d696b9da8d04f9dfd860cbd4f7b
                    • Instruction ID: 283a7c3300d92b255a6ca47443d8b33267b4c97b888d57ffcb2d6aadcbbad4ef
                    • Opcode Fuzzy Hash: a12d118db407d409e24a857823dd06562f533d696b9da8d04f9dfd860cbd4f7b
                    • Instruction Fuzzy Hash: C51127B5800349CFDB10CF99D584BDEBBF4FB58364F24841AD458A7600C374A595CFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • OleInitialize.OLE32(00000000), ref: 04EAF435
                    Memory Dump Source
                    • Source File: 00000001.00000002.680759585.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4ea0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: Initialize
                    • String ID:
                    • API String ID: 2538663250-0
                    • Opcode ID: 7a89476c399ce9b88fa20d4d35b496071324db00163b8f780f69172f71ea4026
                    • Instruction ID: 09b89416203fccf4aab1bf2643fa2b6c2208ac0fbf52d6f6d303521c5cb94612
                    • Opcode Fuzzy Hash: 7a89476c399ce9b88fa20d4d35b496071324db00163b8f780f69172f71ea4026
                    • Instruction Fuzzy Hash: 211112B5900349CFCB10CFAAD5847CEBFF4AB48324F24852AD559A7600C374A945CFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • SendMessageW.USER32(?,?,?,?,?,?,?,?,?,00000000), ref: 04EABCBD
                    Memory Dump Source
                    • Source File: 00000001.00000002.680759585.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4ea0000_SAaX2wNRn2.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: f4bb1589632ff504c96f761408fb9d92afc75701046a9c088563277ec5fc2cf1
                    • Instruction ID: 5c08bcee1e23eba36234b998e71be910752fcbf702801c8be25317e2f56948d5
                    • Opcode Fuzzy Hash: f4bb1589632ff504c96f761408fb9d92afc75701046a9c088563277ec5fc2cf1
                    • Instruction Fuzzy Hash: 191100B5800349CFDB10CF9AD584BDEBBF4FB48324F24845AD518AB600C374AA94CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%