Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
A1DB2JVWGG.CNT.exe

Overview

General Information

Sample Name:A1DB2JVWGG.CNT.exe
Analysis ID:880328
MD5:a7817732eded62797b0c5e9da109edd7
SHA1:e7e868e8a529cdd6bd32b4fa3711eff0c9029dbb
SHA256:95969e3e0c1793e6177d5c5d20c9a667c9f28bb64907ad489682c41668efc29d
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore, DarkComet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sigma detected: NanoCore
Detected Nanocore Rat
Antivirus detection for URL or domain
Antivirus detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected DarkComet
Sigma detected: Scheduled temp file as task from temp location
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Uses cmd line tools excessively to alter registry or file data
Machine Learning detection for sample
Drops PE files to the document folder of the user
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Deletes itself after installation
Creates a thread in another existing process (thread injection)
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Installs a global keyboard hook
Writes to foreign memory regions
Changes security center settings (notifications, updates, antivirus, firewall)
Disables the Windows task manager (taskmgr)
Creates an undocumented autostart registry key
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Modifies existing windows services
Drops PE files
Tries to load missing DLLs
Yara detected Keylogger Generic
Creates a process in suspended mode (likely to inject code)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Internet Provider seen in connection with other malware
Found potential string decryption / allocating functions
Searches for user specific document files
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Enables driver privileges
Detected TCP or UDP traffic on non-standard ports
Enables security privileges

Classification

  • System is w10x64
  • A1DB2JVWGG.CNT.exe (PID: 7460 cmdline: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe MD5: A7817732EDED62797B0C5E9DA109EDD7)
    • powershell.exe (PID: 7544 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 7552 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 7640 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\JXayEzy.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 7668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 7660 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmp12D0.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7688 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • A1DB2JVWGG.CNT.exe (PID: 7852 cmdline: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe MD5: A7817732EDED62797B0C5E9DA109EDD7)
    • A1DB2JVWGG.CNT.exe (PID: 7908 cmdline: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe MD5: A7817732EDED62797B0C5E9DA109EDD7)
    • A1DB2JVWGG.CNT.exe (PID: 7936 cmdline: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe MD5: A7817732EDED62797B0C5E9DA109EDD7)
    • A1DB2JVWGG.CNT.exe (PID: 7948 cmdline: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe MD5: A7817732EDED62797B0C5E9DA109EDD7)
      • cmd.exe (PID: 8032 cmdline: "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe" +s +h MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 8048 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • attrib.exe (PID: 8096 cmdline: attrib "C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe" +s +h MD5: A5540E9F87D4CB083BDF8269DEC1CFF9)
      • cmd.exe (PID: 8040 cmdline: "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop" +s +h MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 8064 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • attrib.exe (PID: 8152 cmdline: attrib "C:\Users\user\Desktop" +s +h MD5: A5540E9F87D4CB083BDF8269DEC1CFF9)
      • JUNE STUB.EXE (PID: 8176 cmdline: "C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE" MD5: 4D9AC7D6E684CD3874B662971B6BC536)
      • notepad.exe (PID: 7292 cmdline: notepad MD5: D693F13FE3AA2010B854C4C60671B8E2)
      • msdcsc.exe (PID: 5860 cmdline: "C:\Users\user\Documents\MSDCSC\msdcsc.exe" MD5: A7817732EDED62797B0C5E9DA109EDD7)
        • powershell.exe (PID: 2680 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Documents\MSDCSC\msdcsc.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
          • conhost.exe (PID: 4404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • powershell.exe (PID: 7672 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\JXayEzy.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
          • conhost.exe (PID: 7732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • schtasks.exe (PID: 7688 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmp5A49.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
          • conhost.exe (PID: 2100 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • msdcsc.exe (PID: 6284 cmdline: C:\Users\user\Documents\MSDCSC\msdcsc.exe MD5: A7817732EDED62797B0C5E9DA109EDD7)
        • msdcsc.exe (PID: 6288 cmdline: C:\Users\user\Documents\MSDCSC\msdcsc.exe MD5: A7817732EDED62797B0C5E9DA109EDD7)
          • JUNE STUB.EXE (PID: 8152 cmdline: "C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE" MD5: 4D9AC7D6E684CD3874B662971B6BC536)
          • notepad.exe (PID: 1340 cmdline: notepad MD5: D693F13FE3AA2010B854C4C60671B8E2)
  • JXayEzy.exe (PID: 7808 cmdline: C:\Users\user\AppData\Roaming\JXayEzy.exe MD5: A7817732EDED62797B0C5E9DA109EDD7)
  • msdcsc.exe (PID: 7264 cmdline: "C:\Users\user\Documents\MSDCSC\msdcsc.exe" MD5: A7817732EDED62797B0C5E9DA109EDD7)
    • schtasks.exe (PID: 7804 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmp9C72.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7772 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • msdcsc.exe (PID: 5840 cmdline: C:\Users\user\Documents\MSDCSC\msdcsc.exe MD5: A7817732EDED62797B0C5E9DA109EDD7)
  • dhcpmon.exe (PID: 6384 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: 4D9AC7D6E684CD3874B662971B6BC536)
  • msdcsc.exe (PID: 7432 cmdline: "C:\Users\user\Documents\MSDCSC\msdcsc.exe" MD5: A7817732EDED62797B0C5E9DA109EDD7)
    • schtasks.exe (PID: 7612 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmpE34F.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • msdcsc.exe (PID: 5100 cmdline: C:\Users\user\Documents\MSDCSC\msdcsc.exe MD5: A7817732EDED62797B0C5E9DA109EDD7)
    • msdcsc.exe (PID: 5236 cmdline: C:\Users\user\Documents\MSDCSC\msdcsc.exe MD5: A7817732EDED62797B0C5E9DA109EDD7)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Nanocore RAT, NanoCoreNanocore is a Remote Access Tool used to steal credentials and to spy on cameras. It as been used for a while by numerous criminal actors as well as by nation state threat actors.
  • APT33
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.nanocore
NameDescriptionAttributionBlogpost URLsLink
DarkCometDarkComet is one of the most famous RATs, developed by Jean-Pierre Lesueur in 2008. After being used in the Syrian civil war in 2011, Lesuer decided to stop developing the trojan. Indeed, DarkComet is able to enable control over a compromised system through use of a simple graphic user interface. Experts think that this user friendliness is the key of its mass success.
  • APT33
  • Lazarus Group
  • Operation C-Major
https://malpedia.caad.fkie.fraunhofer.de/details/win.darkcomet
{"MUTEX": "DC_MUTEX-75NC51J", "SID": "JUNE 2023", "FWB": "0", "NETDATA": ["timmy08.ddns.net:39399"], "GENCODE": "l2V3BCJaaFmA", "INSTALL": "1", "COMBOPATH": "7", "EDTPATH": "MSDCSC\\msdcsc.exe", "KEYNAME": "chrome", "EDTDATE": "16/04/2007", "PERSINST": "1", "MELT": "1", "CHANGEDATE": "0", "DIRATTRIB": "6", "FILEATTRIB": "6", "SH1": "1", "SH3": "1", "SH7": "1", "SH8": "1", "SH9": "1", "CHIDEF": "1", "CHIDED": "1", "PERS": "1", "OFFLINEK": "1", "BIND": "1", "MULTIBIND": "1"}
{"Version": "1.2.2.0", "Mutex": "29684d78-e3d5-43d3-a123-9a499c31", "Group": "JUNE 2023", "Domain1": "timmy08.ddns.net", "Domain2": "timmy06.ddns.net", "Port": 28289, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\JUNE STUB.EXENanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
  • 0x1018d:$x1: NanoCore.ClientPluginHost
  • 0x101ca:$x2: IClientNetworkHost
  • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
C:\Users\user\AppData\Local\Temp\JUNE STUB.EXENanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
  • 0xff05:$x1: NanoCore Client.exe
  • 0x1018d:$x2: NanoCore.ClientPluginHost
  • 0x117c6:$s1: PluginCommand
  • 0x117ba:$s2: FileCommand
  • 0x1266b:$s3: PipeExists
  • 0x18422:$s4: PipeCreated
  • 0x101b7:$s5: IClientLoggingHost
C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0xfef5:$x1: NanoCore Client
    • 0xff05:$x1: NanoCore Client
    • 0x1014d:$x2: NanoCore.ClientPlugin
    • 0x1018d:$x3: NanoCore.ClientPluginHost
    • 0x10142:$i1: IClientApp
    • 0x10163:$i2: IClientData
    • 0x1016f:$i3: IClientNetwork
    • 0x1017e:$i4: IClientAppHost
    • 0x101a7:$i5: IClientDataHost
    • 0x101b7:$i6: IClientLoggingHost
    • 0x101ca:$i7: IClientNetworkHost
    • 0x101dd:$i8: IClientUIHost
    • 0x101eb:$i9: IClientNameObjectCollection
    • 0x10207:$i10: IClientReadOnlyNameObjectCollection
    • 0xff54:$s1: ClientPlugin
    • 0x10156:$s1: ClientPlugin
    • 0x1064a:$s2: EndPoint
    • 0x10653:$s3: IPAddress
    • 0x1065d:$s4: IPEndPoint
    • 0x12093:$s6: get_ClientSettings
    • 0x12637:$s7: get_Connected
    C:\Users\user\AppData\Local\Temp\JUNE STUB.EXENanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfef5:$a: NanoCore
    • 0xff05:$a: NanoCore
    • 0x10139:$a: NanoCore
    • 0x1014d:$a: NanoCore
    • 0x1018d:$a: NanoCore
    • 0xff54:$b: ClientPlugin
    • 0x10156:$b: ClientPlugin
    • 0x10196:$b: ClientPlugin
    • 0x1007b:$c: ProjectData
    • 0x10a82:$d: DESCrypto
    • 0x1844e:$e: KeepAlive
    • 0x1643c:$g: LogClientMessage
    • 0x12637:$i: get_Connected
    • 0x10db8:$j: #=q
    • 0x10de8:$j: #=q
    • 0x10e04:$j: #=q
    • 0x10e34:$j: #=q
    • 0x10e50:$j: #=q
    • 0x10e6c:$j: #=q
    • 0x10e9c:$j: #=q
    • 0x10eb8:$j: #=q
    Click to see the 7 entries
    SourceRuleDescriptionAuthorStrings
    00000020.00000002.622990283.0000000002C81000.00000004.00001000.00020000.00000000.sdmpDarkComet_2DarkCometJean-Philippe Teissier / @Jipe_
    • 0xf58:$b: #EOF DARKCOMET DATA --
    • 0xfd7:$c: DC_MUTEX-
    00000027.00000002.468665185.0000000002E81000.00000004.00001000.00020000.00000000.sdmpDarkComet_2DarkCometJean-Philippe Teissier / @Jipe_
    • 0xf08:$a: #BEGIN DARKCOMET DATA --
    • 0xfd0:$a: #BEGIN DARKCOMET DATA --
    • 0xee0:$b: #EOF DARKCOMET DATA --
    • 0xfaf:$c: DC_MUTEX-
    00000027.00000002.468665185.0000000002E7A000.00000004.00001000.00020000.00000000.sdmpDarkComet_2DarkCometJean-Philippe Teissier / @Jipe_
    • 0x948:$c: DC_MUTEX-
    00000013.00000002.639756642.0000000006C60000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
    • 0x5b0b:$x1: NanoCore.ClientPluginHost
    • 0x5b44:$x2: IClientNetworkHost
    00000013.00000002.639756642.0000000006C60000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
    • 0x5b0b:$x2: NanoCore.ClientPluginHost
    • 0x5c0f:$s4: PipeCreated
    • 0x5b25:$s5: IClientLoggingHost
    Click to see the 199 entries
    SourceRuleDescriptionAuthorStrings
    19.2.JUNE STUB.EXE.6c40000.16.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
    • 0x16e3:$x1: NanoCore.ClientPluginHost
    • 0x171c:$x2: IClientNetworkHost
    19.2.JUNE STUB.EXE.6c40000.16.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
    • 0x16e3:$x2: NanoCore.ClientPluginHost
    • 0x1800:$s4: PipeCreated
    • 0x16fd:$s5: IClientLoggingHost
    19.2.JUNE STUB.EXE.6c40000.16.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0x175f:$x2: NanoCore.ClientPlugin
    • 0x16e3:$x3: NanoCore.ClientPluginHost
    • 0x1775:$i3: IClientNetwork
    • 0x16fd:$i6: IClientLoggingHost
    • 0x171c:$i7: IClientNetworkHost
    • 0x1491:$s1: ClientPlugin
    • 0x1768:$s1: ClientPlugin
    19.2.JUNE STUB.EXE.6c40000.16.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0x16e3:$a1: NanoCore.ClientPluginHost
    • 0x175f:$a2: NanoCore.ClientPlugin
    • 0x16fd:$b9: IClientLoggingHost
    19.2.JUNE STUB.EXE.6ce0000.23.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
    • 0x350b:$x1: NanoCore.ClientPluginHost
    • 0x3525:$x2: IClientNetworkHost
    Click to see the 344 entries

    AV Detection

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, ProcessId: 8176, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    E-Banking Fraud

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, ProcessId: 8176, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Persistence and Installation Behavior

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmp12D0.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmp12D0.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe, ParentImage: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe, ParentProcessId: 7460, ParentProcessName: A1DB2JVWGG.CNT.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmp12D0.tmp, ProcessId: 7660, ProcessName: schtasks.exe

    Stealing of Sensitive Information

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, ProcessId: 8176, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Remote Access Functionality

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, ProcessId: 8176, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
    Timestamp:192.168.2.35.252.165.23049702282892025019 06/02/23-02:26:44.385767
    SID:2025019
    Source Port:49702
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:5.252.165.230192.168.2.339399497042806577 06/02/23-02:27:01.218517
    SID:2806577
    Source Port:39399
    Destination Port:49704
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049711282892025019 06/02/23-02:27:54.203652
    SID:2025019
    Source Port:49711
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049713282892025019 06/02/23-02:28:03.961219
    SID:2025019
    Source Port:49713
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049705282892025019 06/02/23-02:27:16.433852
    SID:2025019
    Source Port:49705
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049712282892025019 06/02/23-02:27:59.459924
    SID:2025019
    Source Port:49712
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049716282892025019 06/02/23-02:28:22.359438
    SID:2025019
    Source Port:49716
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049706282892025019 06/02/23-02:27:24.140871
    SID:2025019
    Source Port:49706
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049708282892025019 06/02/23-02:27:35.526983
    SID:2025019
    Source Port:49708
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049707282892025019 06/02/23-02:27:28.447502
    SID:2025019
    Source Port:49707
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049713282892816718 06/02/23-02:28:05.016410
    SID:2816718
    Source Port:49713
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049702282892816718 06/02/23-02:26:45.935768
    SID:2816718
    Source Port:49702
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049710282892025019 06/02/23-02:27:47.888873
    SID:2025019
    Source Port:49710
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049708282892816766 06/02/23-02:27:36.099395
    SID:2816766
    Source Port:49708
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049707282892816766 06/02/23-02:27:29.300655
    SID:2816766
    Source Port:49707
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049709282892816766 06/02/23-02:27:43.508322
    SID:2816766
    Source Port:49709
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049706282892816766 06/02/23-02:27:24.211225
    SID:2816766
    Source Port:49706
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049716282892816766 06/02/23-02:28:25.005929
    SID:2816766
    Source Port:49716
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049709282892025019 06/02/23-02:27:41.004326
    SID:2025019
    Source Port:49709
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049704393992806578 06/02/23-02:27:01.218732
    SID:2806578
    Source Port:49704
    Destination Port:39399
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049704393992807821 06/02/23-02:28:23.003919
    SID:2807821
    Source Port:49704
    Destination Port:39399
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049710282892816766 06/02/23-02:27:48.244529
    SID:2816766
    Source Port:49710
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049711282892816766 06/02/23-02:27:54.312190
    SID:2816766
    Source Port:49711
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:5.252.165.230192.168.2.328289497142841753 06/02/23-02:28:11.405336
    SID:2841753
    Source Port:28289
    Destination Port:49714
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049702282892816766 06/02/23-02:26:46.881522
    SID:2816766
    Source Port:49702
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049712282892816766 06/02/23-02:27:59.647498
    SID:2816766
    Source Port:49712
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049713282892816766 06/02/23-02:28:06.982149
    SID:2816766
    Source Port:49713
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:5.252.165.230192.168.2.328289497062810290 06/02/23-02:27:24.236176
    SID:2810290
    Source Port:28289
    Destination Port:49706
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:5.252.165.230192.168.2.328289497032841753 06/02/23-02:27:02.943535
    SID:2841753
    Source Port:28289
    Destination Port:49703
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049714282892816766 06/02/23-02:28:11.424790
    SID:2816766
    Source Port:49714
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049715282892816766 06/02/23-02:28:17.957593
    SID:2816766
    Source Port:49715
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049703282892816766 06/02/23-02:27:05.840215
    SID:2816766
    Source Port:49703
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049705282892816766 06/02/23-02:27:18.414247
    SID:2816766
    Source Port:49705
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:5.252.165.230192.168.2.328289497122841753 06/02/23-02:27:59.490400
    SID:2841753
    Source Port:28289
    Destination Port:49712
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:5.252.165.230192.168.2.328289497102841753 06/02/23-02:27:47.915148
    SID:2841753
    Source Port:28289
    Destination Port:49710
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:5.252.165.230192.168.2.328289497112841753 06/02/23-02:27:54.245563
    SID:2841753
    Source Port:28289
    Destination Port:49711
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:5.252.165.230192.168.2.328289497062841753 06/02/23-02:27:24.193892
    SID:2841753
    Source Port:28289
    Destination Port:49706
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:5.252.165.230192.168.2.328289497072841753 06/02/23-02:27:28.477912
    SID:2841753
    Source Port:28289
    Destination Port:49707
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:5.252.165.230192.168.2.328289497082841753 06/02/23-02:27:35.555003
    SID:2841753
    Source Port:28289
    Destination Port:49708
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049715282892025019 06/02/23-02:28:16.130201
    SID:2025019
    Source Port:49715
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049703282892025019 06/02/23-02:26:52.916534
    SID:2025019
    Source Port:49703
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.35.252.165.23049714282892025019 06/02/23-02:28:11.375206
    SID:2025019
    Source Port:49714
    Destination Port:28289
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: timmy06.ddns.netAvira URL Cloud: Label: malware
    Source: timmy08.ddns.netAvira URL Cloud: Label: malware
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEAvira: detection malicious, Label: TR/Dropper.MSIL.Gen7
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen7
    Source: Yara matchFile source: 22.2.msdcsc.exe.504a4f4.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3a22a45.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3a1e41c.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.JUNE STUB.EXE.5d10000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.msdcsc.exe.4b4dcb4.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.msdcsc.exe.4126b74.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3a1e41c.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.JUNE STUB.EXE.5d14629.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.JUNE STUB.EXE.5d10000.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.msdcsc.exe.504a4f4.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3a195e6.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.msdcsc.exe.4126b74.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000021.00000002.456486839.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000022.00000002.459239135.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000000.391419117.0000000000CC2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.637176007.0000000005D10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.470317430.0000000004126000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000021.00000002.454672045.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.397292430.00000000004A4000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000016.00000002.486347814.0000000005049000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: JUNE STUB.EXE PID: 8176, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: msdcsc.exe PID: 7264, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6384, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: JUNE STUB.EXE PID: 8152, type: MEMORYSTR
    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, type: DROPPED
    Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
    Source: 00000021.00000002.456486839.00000000039D1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "29684d78-e3d5-43d3-a123-9a499c31", "Group": "JUNE 2023", "Domain1": "timmy08.ddns.net", "Domain2": "timmy06.ddns.net", "Port": 28289, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Enable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpackMalware Configuration Extractor: DarkComet {"MUTEX": "DC_MUTEX-75NC51J", "SID": "JUNE 2023", "FWB": "0", "NETDATA": ["timmy08.ddns.net:39399"], "GENCODE": "l2V3BCJaaFmA", "INSTALL": "1", "COMBOPATH": "7", "EDTPATH": "MSDCSC\\msdcsc.exe", "KEYNAME": "chrome", "EDTDATE": "16/04/2007", "PERSINST": "1", "MELT": "1", "CHANGEDATE": "0", "DIRATTRIB": "6", "FILEATTRIB": "6", "SH1": "1", "SH3": "1", "SH7": "1", "SH8": "1", "SH9": "1", "CHIDEF": "1", "CHIDED": "1", "PERS": "1", "OFFLINEK": "1", "BIND": "1", "MULTIBIND": "1"}
    Source: A1DB2JVWGG.CNT.exeReversingLabs: Detection: 21%
    Source: A1DB2JVWGG.CNT.exeVirustotal: Detection: 29%Perma Link
    Source: timmy08.ddns.netVirustotal: Detection: 13%Perma Link
    Source: timmy08.ddns.netVirustotal: Detection: 13%Perma Link
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeReversingLabs: Detection: 27%
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeReversingLabs: Detection: 27%
    Source: A1DB2JVWGG.CNT.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeJoe Sandbox ML: detected
    Source: A1DB2JVWGG.CNT.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
    Source: A1DB2JVWGG.CNT.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: hC:\Windows\System.pdb source: JUNE STUB.EXE, 00000013.00000002.638522361.00000000069BC000.00000004.00000010.00020000.00000000.sdmp
    Source: Binary string: TIvm.pdbSHA256p source: A1DB2JVWGG.CNT.exe, msdcsc.exe.12.dr, JXayEzy.exe.0.dr
    Source: Binary string: TIvm.pdb source: A1DB2JVWGG.CNT.exe, msdcsc.exe.12.dr, JXayEzy.exe.0.dr
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: JUNE STUB.EXE, 00000013.00000002.639756642.0000000006C60000.00000004.08000000.00040000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb source: JUNE STUB.EXE, 00000013.00000003.487501423.0000000006B70000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.483018653.0000000006B6C000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.474665549.0000000006B65000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.510762326.0000000006B6C000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.448971012.0000000006B6E000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.506714700.0000000006B71000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.497686142.0000000006B6C000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.455711807.0000000006B6E000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.460528968.0000000006B6E000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000002.640130436.0000000006C90000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000002.640312728.0000000006CB0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000002.639572623.0000000006C40000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: indows\System.pdbpdbtem.pdb source: JUNE STUB.EXE, 00000013.00000002.624951060.0000000003055000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Windows\symbols\dll\System.pdb source: JUNE STUB.EXE, 00000013.00000002.624951060.0000000003055000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000002.640195396.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: indows\dll\System.pdb source: JUNE STUB.EXE, 00000013.00000002.624951060.0000000003055000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.pdb source: JUNE STUB.EXE, 00000013.00000002.624951060.0000000003055000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000002.640048341.0000000006C80000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb source: JUNE STUB.EXE, 00000013.00000002.624951060.0000000003055000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Windows\System.pdb source: JUNE STUB.EXE, 00000013.00000002.624951060.0000000003055000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile opened: C:\Users\user
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile opened: C:\Users\user\AppData
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile opened: C:\Users\user\AppData\Roaming
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 4x nop then jmp 0785B403h

    Networking

    barindex
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49702 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49702 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.3:49702 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49703 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49703 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 5.252.165.230:28289 -> 192.168.2.3:49703
    Source: TrafficSnort IDS: 2806577 ETPRO TROJAN DarkComet-RAT init connection 2 5.252.165.230:39399 -> 192.168.2.3:49704
    Source: TrafficSnort IDS: 2806578 ETPRO TROJAN DarkComet-RAT server join acknowledgement 2 192.168.2.3:49704 -> 5.252.165.230:39399
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49705 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49705 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2807821 ETPRO TROJAN DarkComet-RAT activity 192.168.2.3:49704 -> 5.252.165.230:39399
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49706 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 5.252.165.230:28289 -> 192.168.2.3:49706
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49706 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 5.252.165.230:28289 -> 192.168.2.3:49706
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49707 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 5.252.165.230:28289 -> 192.168.2.3:49707
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49707 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49708 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 5.252.165.230:28289 -> 192.168.2.3:49708
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49708 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49709 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49709 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49710 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 5.252.165.230:28289 -> 192.168.2.3:49710
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49710 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49711 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 5.252.165.230:28289 -> 192.168.2.3:49711
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49711 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49712 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 5.252.165.230:28289 -> 192.168.2.3:49712
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49712 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49713 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49713 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.3:49713 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49714 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 5.252.165.230:28289 -> 192.168.2.3:49714
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49714 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49715 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49715 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49716 -> 5.252.165.230:28289
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49716 -> 5.252.165.230:28289
    Source: unknownDNS query: name: timmy08.ddns.net
    Source: Malware configuration extractorURLs: timmy06.ddns.net
    Source: Malware configuration extractorURLs: timmy08.ddns.net
    Source: Joe Sandbox ViewASN Name: RIXCLOUD-INCUS RIXCLOUD-INCUS
    Source: global trafficTCP traffic: 192.168.2.3:49702 -> 5.252.165.230:28289
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.358071188.0000000005DBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.wikip
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
    Source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000002.640195396.0000000006CA0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://google.com
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.392562881.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, msdcsc.exe, 00000015.00000002.442690195.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, msdcsc.exe, 00000016.00000002.475372371.00000000033B7000.00000004.00000800.00020000.00000000.sdmp, msdcsc.exe, 00000024.00000002.512029267.0000000003097000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.358704115.0000000005DB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comtig
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.358704115.0000000005DB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comto
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.384541193.0000000005DB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.384541193.0000000005DB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comceu3
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441627539.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.384541193.0000000005DB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comm
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.358248155.0000000005DBC000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.358336012.0000000005DBC000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.358248155.0000000005DBC000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.358336012.0000000005DBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn-
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.358336012.0000000005DBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/H
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.358248155.0000000005DBC000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.358336012.0000000005DBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn9
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.358248155.0000000005DBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnK
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.358248155.0000000005DBC000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.358336012.0000000005DBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnU
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.358248155.0000000005DBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnd
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.358248155.0000000005DBC000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.358336012.0000000005DBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnw
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.359124042.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.359247918.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.359124042.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.359247918.0000000005DB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/%
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.359124042.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.359247918.0000000005DB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/3
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.359124042.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.359247918.0000000005DB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/A
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.359124042.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.359247918.0000000005DB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/_
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.359124042.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.359247918.0000000005DB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.359124042.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.359247918.0000000005DB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/H
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.359124042.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.359247918.0000000005DB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/m
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.359124042.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.359247918.0000000005DB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/r-f
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
    Source: unknownDNS traffic detected: queries for: timmy08.ddns.net

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeWindows user hook set: 0 keyboard low level C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: Yara matchFile source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.2f60c98.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.2f2f970.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.397292430.000000000049D000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000016.00000002.475372371.00000000033B7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.442690195.000000000319D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.392562881.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: msdcsc.exe PID: 7264, type: MEMORYSTR
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.388355387.00000000011C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
    Source: JUNE STUB.EXE, 00000013.00000002.637176007.0000000005D10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: 22.2.msdcsc.exe.504a4f4.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3a22a45.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3a1e41c.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.JUNE STUB.EXE.5d10000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.msdcsc.exe.4b4dcb4.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.msdcsc.exe.4126b74.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3a1e41c.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.JUNE STUB.EXE.5d14629.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.JUNE STUB.EXE.5d10000.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.msdcsc.exe.504a4f4.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3a195e6.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.msdcsc.exe.4126b74.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000021.00000002.456486839.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000022.00000002.459239135.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000000.391419117.0000000000CC2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.637176007.0000000005D10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.470317430.0000000004126000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000021.00000002.454672045.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.397292430.00000000004A4000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000016.00000002.486347814.0000000005049000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: JUNE STUB.EXE PID: 8176, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: msdcsc.exe PID: 7264, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6384, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: JUNE STUB.EXE PID: 8152, type: MEMORYSTR
    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, type: DROPPED
    Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED

    System Summary

    barindex
    Source: 19.2.JUNE STUB.EXE.6c40000.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6c40000.16.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6c40000.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6ce0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6ce0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6ce0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6ca0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6ca0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6ca0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.5a80000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.5a80000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.5a80000.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6c80000.18.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6c80000.18.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6c80000.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 22.2.msdcsc.exe.504a4f4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 22.2.msdcsc.exe.504a4f4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 22.2.msdcsc.exe.504a4f4.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 22.2.msdcsc.exe.504a4f4.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6c60000.17.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6c60000.17.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6c60000.17.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6c80000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6c80000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6c80000.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 34.2.JUNE STUB.EXE.2ef3d9c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 34.2.JUNE STUB.EXE.2ef3d9c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 34.2.JUNE STUB.EXE.2ef3d9c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6cd0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6cd0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6cd0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 33.2.dhcpmon.exe.3a22a45.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 33.2.dhcpmon.exe.3a22a45.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 33.2.dhcpmon.exe.3a22a45.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.3430124.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.3430124.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.3430124.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 33.2.dhcpmon.exe.3a1e41c.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 33.2.dhcpmon.exe.3a1e41c.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 33.2.dhcpmon.exe.3a1e41c.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6c20000.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6c20000.15.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6c20000.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.5d10000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.5d10000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.5d10000.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 33.2.dhcpmon.exe.29f3dc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 33.2.dhcpmon.exe.29f3dc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 33.2.dhcpmon.exe.29f3dc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.4588b4e.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.4588b4e.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.4588b4e.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.4591d82.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.4591d82.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.4591d82.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6d0e8a4.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6d0e8a4.26.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6d0e8a4.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.4596a21.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.4596a21.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.4596a21.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 21.2.msdcsc.exe.4b4dcb4.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 21.2.msdcsc.exe.4b4dcb4.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 21.2.msdcsc.exe.4b4dcb4.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 21.2.msdcsc.exe.4b4dcb4.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.4591d82.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.4591d82.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.4591d82.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6c90000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6c90000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6c90000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6ce0000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6ce0000.23.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6ce0000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6cb0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6cb0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6cb0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 21.2.msdcsc.exe.4126b74.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 21.2.msdcsc.exe.4126b74.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 21.2.msdcsc.exe.4126b74.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 21.2.msdcsc.exe.4126b74.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6c60000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6c60000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6c60000.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.3444758.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.3444758.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.3444758.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 19.2.JUNE STUB.EXE.3444758.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6cb0000.21.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6cb0000.21.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6cb0000.21.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6d00000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6d00000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6d00000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6cd0000.22.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6cd0000.22.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6cd0000.22.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects DarkComet Author: ditekSHen
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_4 Author: unknown
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 33.2.dhcpmon.exe.3a1e41c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 33.2.dhcpmon.exe.3a1e41c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 33.2.dhcpmon.exe.3a1e41c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.3423ee4.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.3423ee4.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.3423ee4.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.5d14629.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.5d14629.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.5d14629.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6c10000.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6c10000.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6c10000.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.442df9c.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.442df9c.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.442df9c.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects DarkComet Author: ditekSHen
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_4 Author: unknown
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.441f6f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.441f6f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.441f6f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6d30000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6d30000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6d30000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.4424397.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.4424397.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.4424397.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6ca0000.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6ca0000.20.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6ca0000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects DarkComet Author: ditekSHen
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_4 Author: unknown
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
    Source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6c20000.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6c20000.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6c20000.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.5d10000.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.5d10000.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.5d10000.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6d04c9f.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6d04c9f.25.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6d04c9f.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.4588b4e.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.4588b4e.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.4588b4e.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects DarkComet Author: ditekSHen
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_4 Author: unknown
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6d30000.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6d30000.27.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6d30000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6d00000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6d00000.24.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6d00000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.6c10000.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.6c10000.14.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.6c10000.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 22.2.msdcsc.exe.504a4f4.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 22.2.msdcsc.exe.504a4f4.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 22.2.msdcsc.exe.504a4f4.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 22.2.msdcsc.exe.504a4f4.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.33b13b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.33b13b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.33b13b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 33.2.dhcpmon.exe.3a195e6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 33.2.dhcpmon.exe.3a195e6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 33.2.dhcpmon.exe.3a195e6.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 33.2.dhcpmon.exe.3a195e6.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.441f6f8.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.441f6f8.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.441f6f8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.3430124.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.3430124.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.3430124.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 19.2.JUNE STUB.EXE.3430124.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 21.2.msdcsc.exe.4126b74.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 21.2.msdcsc.exe.4126b74.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 21.2.msdcsc.exe.4126b74.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 21.2.msdcsc.exe.4126b74.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 19.2.JUNE STUB.EXE.3423ee4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 19.2.JUNE STUB.EXE.3423ee4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.JUNE STUB.EXE.3423ee4.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 19.2.JUNE STUB.EXE.3423ee4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects DarkComet Author: ditekSHen
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_4 Author: unknown
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000020.00000002.622990283.0000000002C81000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: 00000027.00000002.468665185.0000000002E81000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: 00000027.00000002.468665185.0000000002E7A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: 00000013.00000002.639756642.0000000006C60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000013.00000002.639756642.0000000006C60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000013.00000002.639756642.0000000006C60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000C.00000002.400104178.0000000003096000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: 0000002B.00000002.507022400.0000000002ACA000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: 00000020.00000002.622990283.0000000002C2C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: 00000013.00000002.640582585.0000000006CE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000013.00000002.640582585.0000000006CE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000013.00000002.640582585.0000000006CE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000013.00000002.640822750.0000000006D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000013.00000002.640822750.0000000006D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000013.00000002.640822750.0000000006D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000002B.00000002.507022400.0000000002AA6000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: 00000021.00000002.456486839.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000021.00000002.456486839.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000002B.00000002.507022400.0000000002A7C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: 00000027.00000002.468665185.0000000002E56000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: 00000020.00000002.622990283.0000000002C7A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: 00000022.00000002.459239135.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000022.00000002.459239135.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000013.00000002.639572623.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000013.00000002.639572623.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000013.00000002.639572623.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000013.00000002.639327601.0000000006C10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000013.00000002.639327601.0000000006C10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000013.00000002.639327601.0000000006C10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects DarkComet Author: ditekSHen
    Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
    Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 Author: unknown
    Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
    Source: 00000013.00000002.640048341.0000000006C80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000013.00000002.640048341.0000000006C80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000013.00000002.640048341.0000000006C80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000027.00000002.468665185.0000000002E2C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: 00000013.00000000.391419117.0000000000CC2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000013.00000000.391419117.0000000000CC2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000013.00000000.391419117.0000000000CC2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000013.00000002.640453706.0000000006CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000013.00000002.640453706.0000000006CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000013.00000002.640453706.0000000006CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000013.00000002.639417055.0000000006C20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000013.00000002.639417055.0000000006C20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000013.00000002.639417055.0000000006C20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000013.00000002.640195396.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000013.00000002.640195396.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000013.00000002.640195396.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000013.00000002.640312728.0000000006CB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000013.00000002.640312728.0000000006CB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000013.00000002.640312728.0000000006CB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000013.00000002.640130436.0000000006C90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000013.00000002.640130436.0000000006C90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000013.00000002.640130436.0000000006C90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
    Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 Author: unknown
    Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
    Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000C.00000002.400104178.000000000306C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: 00000013.00000002.637176007.0000000005D10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000013.00000002.637176007.0000000005D10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000013.00000002.637176007.0000000005D10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000013.00000002.631531483.0000000004515000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000015.00000002.470317430.0000000004126000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000015.00000002.470317430.0000000004126000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000015.00000002.470317430.0000000004126000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000013.00000002.641220331.0000000006D30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000013.00000002.641220331.0000000006D30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000013.00000002.641220331.0000000006D30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000C.00000002.400104178.00000000030BA000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: 00000013.00000002.631531483.000000000441F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000013.00000002.636982367.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000013.00000002.636982367.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000013.00000002.636982367.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000021.00000002.454672045.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000021.00000002.454672045.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000013.00000002.625066874.00000000033A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000C.00000002.397292430.00000000004A4000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0000000C.00000002.397292430.00000000004A4000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000C.00000002.397292430.00000000004A4000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000016.00000002.486347814.0000000005049000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000016.00000002.486347814.0000000005049000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000016.00000002.486347814.0000000005049000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000C.00000002.400104178.00000000030C1000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: 0000002B.00000002.507022400.0000000002AD1000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
    Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 Author: unknown
    Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
    Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
    Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 Author: unknown
    Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
    Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTRMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTRMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTRMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTRMatched rule: DarkComet_4 Author: unknown
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTRMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTRMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTRMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTRMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTRMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTRMatched rule: DarkComet_4 Author: unknown
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTRMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: JUNE STUB.EXE PID: 8176, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: Process Memory Space: JUNE STUB.EXE PID: 8176, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: JUNE STUB.EXE PID: 8176, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTRMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTRMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
    Source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTRMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTRMatched rule: DarkComet_4 Author: unknown
    Source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTRMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
    Source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: msdcsc.exe PID: 7264, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: Process Memory Space: msdcsc.exe PID: 7264, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: msdcsc.exe PID: 7264, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: msdcsc.exe PID: 6288, type: MEMORYSTRMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: Process Memory Space: dhcpmon.exe PID: 6384, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: dhcpmon.exe PID: 6384, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: JUNE STUB.EXE PID: 8152, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: JUNE STUB.EXE PID: 8152, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: notepad.exe PID: 1340, type: MEMORYSTRMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: Process Memory Space: msdcsc.exe PID: 5840, type: MEMORYSTRMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: Process Memory Space: msdcsc.exe PID: 5236, type: MEMORYSTRMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, type: DROPPEDMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, type: DROPPEDMatched rule: Detects NanoCore Author: ditekSHen
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, type: DROPPEDMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, type: DROPPEDMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Detects NanoCore Author: ditekSHen
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Yara matchFile source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTR
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 0_2_0153C2B4
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 0_2_0153E6F8
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 0_2_0153E6EB
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 0_2_0785A848
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 0_2_0785572C
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 0_2_0785CAE8
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 0_2_07853920
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeCode function: 7_2_0151C2B4
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeCode function: 7_2_0151E6F8
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeCode function: 7_2_0151E6EA
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_00402370
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_004064C0
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_0043E644
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_004389B4
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_0045EC78
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_0046ADBC
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_0046797C
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_00469B90
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeSection loaded: starttiledata.dll
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeSection loaded: sfc.dll
    Source: A1DB2JVWGG.CNT.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 19.2.JUNE STUB.EXE.6c40000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c40000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c40000.16.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6c40000.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6ce0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6ce0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6ce0000.23.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6ce0000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6ca0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6ca0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6ca0000.20.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6ca0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.5a80000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.5a80000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.5a80000.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.5a80000.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6c80000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c80000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c80000.18.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6c80000.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 22.2.msdcsc.exe.504a4f4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 22.2.msdcsc.exe.504a4f4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 22.2.msdcsc.exe.504a4f4.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 22.2.msdcsc.exe.504a4f4.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 22.2.msdcsc.exe.504a4f4.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6c60000.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c60000.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c60000.17.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6c60000.17.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6c80000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c80000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c80000.18.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6c80000.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 34.2.JUNE STUB.EXE.2ef3d9c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 34.2.JUNE STUB.EXE.2ef3d9c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 34.2.JUNE STUB.EXE.2ef3d9c.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 34.2.JUNE STUB.EXE.2ef3d9c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6cd0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6cd0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6cd0000.22.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6cd0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 33.2.dhcpmon.exe.3a22a45.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 33.2.dhcpmon.exe.3a22a45.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 33.2.dhcpmon.exe.3a22a45.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 33.2.dhcpmon.exe.3a22a45.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.3430124.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.3430124.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.3430124.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.3430124.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 33.2.dhcpmon.exe.3a1e41c.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 33.2.dhcpmon.exe.3a1e41c.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 33.2.dhcpmon.exe.3a1e41c.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 33.2.dhcpmon.exe.3a1e41c.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6c20000.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c20000.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c20000.15.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6c20000.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.5d10000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.5d10000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.5d10000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.5d10000.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 33.2.dhcpmon.exe.29f3dc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 33.2.dhcpmon.exe.29f3dc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 33.2.dhcpmon.exe.29f3dc4.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 33.2.dhcpmon.exe.29f3dc4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.4588b4e.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.4588b4e.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.4588b4e.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.4588b4e.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.4591d82.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.4591d82.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.4591d82.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.4591d82.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6d0e8a4.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6d0e8a4.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6d0e8a4.26.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6d0e8a4.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.4596a21.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.4596a21.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.4596a21.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.4596a21.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 21.2.msdcsc.exe.4b4dcb4.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 21.2.msdcsc.exe.4b4dcb4.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 21.2.msdcsc.exe.4b4dcb4.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 21.2.msdcsc.exe.4b4dcb4.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 21.2.msdcsc.exe.4b4dcb4.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.4591d82.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.4591d82.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.4591d82.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.4591d82.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6c90000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c90000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c90000.19.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6c90000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6ce0000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6ce0000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6ce0000.23.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6ce0000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6cb0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6cb0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6cb0000.21.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6cb0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 21.2.msdcsc.exe.4126b74.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 21.2.msdcsc.exe.4126b74.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 21.2.msdcsc.exe.4126b74.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 21.2.msdcsc.exe.4126b74.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 21.2.msdcsc.exe.4126b74.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6c60000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c60000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c60000.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6c60000.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.3444758.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.3444758.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.3444758.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 19.2.JUNE STUB.EXE.3444758.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6cb0000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6cb0000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6cb0000.21.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6cb0000.21.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6d00000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6d00000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6d00000.24.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6d00000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6cd0000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6cd0000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6cd0000.22.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6cd0000.22.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: Malware_QA_update date = 2016-08-29, hash2 = 6415b45f5bae6429dd5d92d6cae46e8a704873b7090853e68e80cd179058903e, author = Florian Roth (Nextron Systems), description = VT Research QA uploaded malware - file update.exe, score = 6d805533623d7063241620eec38b7eb9b625533ccadeaf4f6c2cc6db32711541, reference = VT Research QA, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DarkComet author = ditekSHen, description = Detects DarkComet
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
    Source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 33.2.dhcpmon.exe.3a1e41c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 33.2.dhcpmon.exe.3a1e41c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 33.2.dhcpmon.exe.3a1e41c.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 33.2.dhcpmon.exe.3a1e41c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.3423ee4.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.3423ee4.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.3423ee4.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.3423ee4.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.5d14629.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.5d14629.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.5d14629.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.5d14629.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6c10000.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c10000.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c10000.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6c10000.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.442df9c.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.442df9c.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.442df9c.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.442df9c.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Malware_QA_update date = 2016-08-29, hash2 = 6415b45f5bae6429dd5d92d6cae46e8a704873b7090853e68e80cd179058903e, author = Florian Roth (Nextron Systems), description = VT Research QA uploaded malware - file update.exe, score = 6d805533623d7063241620eec38b7eb9b625533ccadeaf4f6c2cc6db32711541, reference = VT Research QA, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DarkComet author = ditekSHen, description = Detects DarkComet
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.441f6f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.441f6f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.441f6f8.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.441f6f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6d30000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6d30000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6d30000.27.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6d30000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.4424397.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.4424397.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.4424397.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.4424397.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6ca0000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6ca0000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6ca0000.20.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6ca0000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Malware_QA_update date = 2016-08-29, hash2 = 6415b45f5bae6429dd5d92d6cae46e8a704873b7090853e68e80cd179058903e, author = Florian Roth (Nextron Systems), description = VT Research QA uploaded malware - file update.exe, score = 6d805533623d7063241620eec38b7eb9b625533ccadeaf4f6c2cc6db32711541, reference = VT Research QA, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DarkComet author = ditekSHen, description = Detects DarkComet
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
    Source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
    Source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6c20000.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c20000.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c20000.15.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6c20000.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.5d10000.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.5d10000.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.5d10000.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.5d10000.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6d04c9f.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6d04c9f.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6d04c9f.25.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6d04c9f.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.4588b4e.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.4588b4e.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.4588b4e.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.4588b4e.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: Malware_QA_update date = 2016-08-29, hash2 = 6415b45f5bae6429dd5d92d6cae46e8a704873b7090853e68e80cd179058903e, author = Florian Roth (Nextron Systems), description = VT Research QA uploaded malware - file update.exe, score = 6d805533623d7063241620eec38b7eb9b625533ccadeaf4f6c2cc6db32711541, reference = VT Research QA, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DarkComet author = ditekSHen, description = Detects DarkComet
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
    Source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6d30000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6d30000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6d30000.27.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6d30000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6d00000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6d00000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6d00000.24.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6d00000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.6c10000.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c10000.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.6c10000.14.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.6c10000.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 22.2.msdcsc.exe.504a4f4.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 22.2.msdcsc.exe.504a4f4.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 22.2.msdcsc.exe.504a4f4.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 22.2.msdcsc.exe.504a4f4.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 22.2.msdcsc.exe.504a4f4.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.33b13b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.33b13b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.33b13b0.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.33b13b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 33.2.dhcpmon.exe.3a195e6.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 33.2.dhcpmon.exe.3a195e6.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 33.2.dhcpmon.exe.3a195e6.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 33.2.dhcpmon.exe.3a195e6.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 33.2.dhcpmon.exe.3a195e6.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.441f6f8.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.441f6f8.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.441f6f8.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.441f6f8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.3430124.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.3430124.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.3430124.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 19.2.JUNE STUB.EXE.3430124.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 21.2.msdcsc.exe.4126b74.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 21.2.msdcsc.exe.4126b74.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 21.2.msdcsc.exe.4126b74.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 21.2.msdcsc.exe.4126b74.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 19.2.JUNE STUB.EXE.3423ee4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.JUNE STUB.EXE.3423ee4.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.JUNE STUB.EXE.3423ee4.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 19.2.JUNE STUB.EXE.3423ee4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: Malware_QA_update date = 2016-08-29, hash2 = 6415b45f5bae6429dd5d92d6cae46e8a704873b7090853e68e80cd179058903e, author = Florian Roth (Nextron Systems), description = VT Research QA uploaded malware - file update.exe, score = 6d805533623d7063241620eec38b7eb9b625533ccadeaf4f6c2cc6db32711541, reference = VT Research QA, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DarkComet author = ditekSHen, description = Detects DarkComet
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
    Source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000020.00000002.622990283.0000000002C81000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: 00000027.00000002.468665185.0000000002E81000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: 00000027.00000002.468665185.0000000002E7A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: 00000013.00000002.639756642.0000000006C60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.639756642.0000000006C60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.639756642.0000000006C60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000013.00000002.639756642.0000000006C60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000C.00000002.400104178.0000000003096000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: 0000002B.00000002.507022400.0000000002ACA000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: 00000020.00000002.622990283.0000000002C2C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: 00000013.00000002.640582585.0000000006CE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.640582585.0000000006CE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.640582585.0000000006CE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000013.00000002.640582585.0000000006CE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000013.00000002.640822750.0000000006D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.640822750.0000000006D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.640822750.0000000006D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000013.00000002.640822750.0000000006D00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000002B.00000002.507022400.0000000002AA6000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: 00000021.00000002.456486839.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000021.00000002.456486839.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000002B.00000002.507022400.0000000002A7C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: 00000027.00000002.468665185.0000000002E56000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: 00000020.00000002.622990283.0000000002C7A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: 00000022.00000002.459239135.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000022.00000002.459239135.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000013.00000002.639572623.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.639572623.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.639572623.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000013.00000002.639572623.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000013.00000002.639327601.0000000006C10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.639327601.0000000006C10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.639327601.0000000006C10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000013.00000002.639327601.0000000006C10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Malware_QA_update date = 2016-08-29, hash2 = 6415b45f5bae6429dd5d92d6cae46e8a704873b7090853e68e80cd179058903e, author = Florian Roth (Nextron Systems), description = VT Research QA uploaded malware - file update.exe, score = 6d805533623d7063241620eec38b7eb9b625533ccadeaf4f6c2cc6db32711541, reference = VT Research QA, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
    Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_DarkComet author = ditekSHen, description = Detects DarkComet
    Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
    Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
    Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
    Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
    Source: 00000013.00000002.640048341.0000000006C80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.640048341.0000000006C80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.640048341.0000000006C80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000013.00000002.640048341.0000000006C80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000027.00000002.468665185.0000000002E2C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: 00000013.00000000.391419117.0000000000CC2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000000.391419117.0000000000CC2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000013.00000000.391419117.0000000000CC2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000013.00000002.640453706.0000000006CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.640453706.0000000006CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.640453706.0000000006CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000013.00000002.640453706.0000000006CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000013.00000002.639417055.0000000006C20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.639417055.0000000006C20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.639417055.0000000006C20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000013.00000002.639417055.0000000006C20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000013.00000002.640195396.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.640195396.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.640195396.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000013.00000002.640195396.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000013.00000002.640312728.0000000006CB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.640312728.0000000006CB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.640312728.0000000006CB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000013.00000002.640312728.0000000006CB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000013.00000002.640130436.0000000006C90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.640130436.0000000006C90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.640130436.0000000006C90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000013.00000002.640130436.0000000006C90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
    Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
    Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
    Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
    Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
    Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000C.00000002.400104178.000000000306C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: 00000013.00000002.637176007.0000000005D10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.637176007.0000000005D10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.637176007.0000000005D10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000013.00000002.637176007.0000000005D10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000013.00000002.631531483.0000000004515000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000015.00000002.470317430.0000000004126000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000015.00000002.470317430.0000000004126000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000015.00000002.470317430.0000000004126000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000013.00000002.641220331.0000000006D30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.641220331.0000000006D30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.641220331.0000000006D30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000013.00000002.641220331.0000000006D30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000C.00000002.400104178.00000000030BA000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: 00000013.00000002.631531483.000000000441F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000013.00000002.636982367.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.636982367.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.636982367.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000013.00000002.636982367.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000021.00000002.454672045.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000021.00000002.454672045.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000013.00000002.625066874.00000000033A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000C.00000002.397292430.00000000004A4000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000C.00000002.397292430.00000000004A4000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000C.00000002.397292430.00000000004A4000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000016.00000002.486347814.0000000005049000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000016.00000002.486347814.0000000005049000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000016.00000002.486347814.0000000005049000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000C.00000002.400104178.00000000030C1000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: 0000002B.00000002.507022400.0000000002AD1000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
    Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
    Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
    Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
    Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
    Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
    Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
    Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
    Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
    Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
    Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTRMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTRMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTRMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTRMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTRMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTRMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTRMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTRMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTRMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTRMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTRMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
    Source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: JUNE STUB.EXE PID: 8176, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: JUNE STUB.EXE PID: 8176, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: JUNE STUB.EXE PID: 8176, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTRMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
    Source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTRMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
    Source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTRMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
    Source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTRMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
    Source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTRMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
    Source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: msdcsc.exe PID: 7264, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: msdcsc.exe PID: 7264, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: msdcsc.exe PID: 7264, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: msdcsc.exe PID: 6288, type: MEMORYSTRMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: Process Memory Space: dhcpmon.exe PID: 6384, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: dhcpmon.exe PID: 6384, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: JUNE STUB.EXE PID: 8152, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: JUNE STUB.EXE PID: 8152, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: notepad.exe PID: 1340, type: MEMORYSTRMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: Process Memory Space: msdcsc.exe PID: 5840, type: MEMORYSTRMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: Process Memory Space: msdcsc.exe PID: 5236, type: MEMORYSTRMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, type: DROPPEDMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, type: DROPPEDMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, type: DROPPEDMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, type: DROPPEDMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, type: DROPPEDMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: String function: 00407B10 appears 139 times
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: String function: 004735E8 appears 39 times
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: String function: 00407B08 appears 33 times
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: String function: 004218E4 appears 86 times
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: String function: 00405584 appears 61 times
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: String function: 00405530 appears 72 times
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: String function: 004055C8 appears 36 times
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: String function: 00405864 appears 33 times
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSRSAAP.EXEV vs A1DB2JVWGG.CNT.exe
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000000.354997708.0000000000B91000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTIvm.exe> vs A1DB2JVWGG.CNT.exe
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.388355387.00000000011C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs A1DB2JVWGG.CNT.exe
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.450107518.0000000008E60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCruiser.dll4 vs A1DB2JVWGG.CNT.exe
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.392562881.0000000002F01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRDX.dll4 vs A1DB2JVWGG.CNT.exe
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.392562881.0000000002F01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCruiser.dll4 vs A1DB2JVWGG.CNT.exe
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.371921496.000000000C056000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTIvm.exe> vs A1DB2JVWGG.CNT.exe
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.441011209.0000000005740000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRDX.dll4 vs A1DB2JVWGG.CNT.exe
    Source: A1DB2JVWGG.CNT.exe, 0000000C.00000002.397292430.00000000004A4000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSRSAAP.EXEV vs A1DB2JVWGG.CNT.exe
    Source: A1DB2JVWGG.CNT.exeBinary or memory string: OriginalFilenameTIvm.exe> vs A1DB2JVWGG.CNT.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess token adjusted: Load Driver
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess token adjusted: Security
    Source: A1DB2JVWGG.CNT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: JXayEzy.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: msdcsc.exe.12.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: JUNE STUB.EXE.12.drStatic PE information: Section: .rsrc ZLIB complexity 0.9995982142857143
    Source: dhcpmon.exe.19.drStatic PE information: Section: .rsrc ZLIB complexity 0.9995982142857143
    Source: A1DB2JVWGG.CNT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile created: C:\Users\user\AppData\Roaming\JXayEzy.exeJump to behavior
    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@67/28@15/2
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: dhcpmon.exe.19.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: dhcpmon.exe.19.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: JUNE STUB.EXE.12.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: JUNE STUB.EXE.12.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_0048DDE0 FindResourceA,
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEFile created: C:\Program Files (x86)\DHCP Monitor
    Source: A1DB2JVWGG.CNT.exeReversingLabs: Detection: 21%
    Source: A1DB2JVWGG.CNT.exeVirustotal: Detection: 29%
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile read: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeJump to behavior
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: unknownProcess created: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\JXayEzy.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmp12D0.tmp
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Users\user\AppData\Roaming\JXayEzy.exe C:\Users\user\AppData\Roaming\JXayEzy.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe" +s +h
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop" +s +h
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib "C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe" +s +h
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib "C:\Users\user\Desktop" +s +h
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE "C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE"
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\notepad.exe notepad
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe "C:\Users\user\Documents\MSDCSC\msdcsc.exe"
    Source: unknownProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe "C:\Users\user\Documents\MSDCSC\msdcsc.exe"
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\JXayEzy.exe
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmp5A49.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE "C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE"
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\notepad.exe notepad
    Source: unknownProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe "C:\Users\user\Documents\MSDCSC\msdcsc.exe"
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmp9C72.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmpE34F.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\JXayEzy.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmp12D0.tmp
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe" +s +h
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop" +s +h
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE "C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE"
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\notepad.exe notepad
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe "C:\Users\user\Documents\MSDCSC\msdcsc.exe"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib "C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe" +s +h
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib "C:\Users\user\Desktop" +s +h
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\JXayEzy.exe
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmp5A49.tmp
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmp9C72.tmp
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE "C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE"
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\notepad.exe notepad
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmpE34F.tmp
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_0048AEA8 AdjustTokenPrivileges,FindCloseChangeNotification,
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile created: C:\Users\user\AppData\Local\Temp\tmp12D0.tmpJump to behavior
    Source: A1DB2JVWGG.CNT.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXESection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXESection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXESection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXESection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7552:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7732:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4404:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7772:120:WilError_01
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8048:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7668:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8064:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7688:120:WilError_01
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEMutant created: \Sessions\1\BaseNamedObjects\Global\{29684d78-e3d5-43d3-a123-9a499c3134c7}
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2100:120:WilError_01
    Source: C:\Windows\SysWOW64\notepad.exeMutant created: \Sessions\1\BaseNamedObjects\DCPERSFWBP
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5304:120:WilError_01
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMutant created: \Sessions\1\BaseNamedObjects\LjIBsAOPqgWq
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMutant created: \Sessions\1\BaseNamedObjects\DC_MUTEX-75NC51J
    Source: Yara matchFile source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: JUNE STUB.EXE.12.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: JUNE STUB.EXE.12.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: JUNE STUB.EXE.12.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: dhcpmon.exe.19.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: dhcpmon.exe.19.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: dhcpmon.exe.19.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeFile read: C:\Windows\System32\drivers\etc\hosts
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeFile read: C:\Windows\System32\drivers\etc\hosts
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
    Source: A1DB2JVWGG.CNT.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
    Source: A1DB2JVWGG.CNT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: A1DB2JVWGG.CNT.exeStatic file information: File size 2223104 > 1048576
    Source: A1DB2JVWGG.CNT.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1b4600
    Source: A1DB2JVWGG.CNT.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: A1DB2JVWGG.CNT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: hC:\Windows\System.pdb source: JUNE STUB.EXE, 00000013.00000002.638522361.00000000069BC000.00000004.00000010.00020000.00000000.sdmp
    Source: Binary string: TIvm.pdbSHA256p source: A1DB2JVWGG.CNT.exe, msdcsc.exe.12.dr, JXayEzy.exe.0.dr
    Source: Binary string: TIvm.pdb source: A1DB2JVWGG.CNT.exe, msdcsc.exe.12.dr, JXayEzy.exe.0.dr
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: JUNE STUB.EXE, 00000013.00000002.639756642.0000000006C60000.00000004.08000000.00040000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb source: JUNE STUB.EXE, 00000013.00000003.487501423.0000000006B70000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.483018653.0000000006B6C000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.474665549.0000000006B65000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.510762326.0000000006B6C000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.448971012.0000000006B6E000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.506714700.0000000006B71000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.497686142.0000000006B6C000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.455711807.0000000006B6E000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.460528968.0000000006B6E000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000002.640130436.0000000006C90000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000002.640312728.0000000006CB0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000002.639572623.0000000006C40000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: indows\System.pdbpdbtem.pdb source: JUNE STUB.EXE, 00000013.00000002.624951060.0000000003055000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Windows\symbols\dll\System.pdb source: JUNE STUB.EXE, 00000013.00000002.624951060.0000000003055000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000002.640195396.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: indows\dll\System.pdb source: JUNE STUB.EXE, 00000013.00000002.624951060.0000000003055000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.pdb source: JUNE STUB.EXE, 00000013.00000002.624951060.0000000003055000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000002.640048341.0000000006C80000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb source: JUNE STUB.EXE, 00000013.00000002.624951060.0000000003055000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Windows\System.pdb source: JUNE STUB.EXE, 00000013.00000002.624951060.0000000003055000.00000004.00000020.00020000.00000000.sdmp

    Data Obfuscation

    barindex
    Source: JUNE STUB.EXE.12.dr, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: JUNE STUB.EXE.12.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: dhcpmon.exe.19.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: dhcpmon.exe.19.dr, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 0_2_078565E5 push edi; retf
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 0_2_078561EA push edx; iretd
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_004186D4 push ecx; mov dword ptr [esp], edx
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_0048F0AC push 0048F125h; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_0048F6D4 push 0048F761h; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_00482058 push 004820C2h; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_0045E078 push 0045E0DEh; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_004220E0 push ecx; mov dword ptr [esp], ecx
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_004660F8 push 00466130h; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_0042E138 push 0042E170h; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_004741C4 push 00474206h; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_004041DC push eax; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_0046224C push 00462284h; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_00464228 push ecx; mov dword ptr [esp], edx
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_004482C4 push 0044832Eh; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_0041632A push 004163A2h; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_0041632C push 004163A2h; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_0048E3AC push 0048E3DCh; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_0046E3A0 push 0046E3EDh; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_004204E4 push ecx; mov dword ptr [esp], edx
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_004086CC push 0040870Eh; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_0044A74C push ecx; mov dword ptr [esp], edx
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_004107FC push 00410828h; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_0042E8B8 push 0042E8E4h; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_00430910 push 00430970h; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_00422924 push 00422967h; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_00418930 push ecx; mov dword ptr [esp], edx
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_0044A9F0 push ecx; mov dword ptr [esp], edx
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_0045E988 push 0045E9B4h; ret
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_00418A50 push ecx; mov dword ptr [esp], edx
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: 12_2_00460A20 push 00460A53h; ret
    Source: initial sampleStatic PE information: section name: .text entropy: 7.897532048001292
    Source: initial sampleStatic PE information: section name: .text entropy: 7.897532048001292
    Source: initial sampleStatic PE information: section name: .text entropy: 7.897532048001292
    Source: JUNE STUB.EXE.12.dr, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: JUNE STUB.EXE.12.dr, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: dhcpmon.exe.19.dr, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: dhcpmon.exe.19.dr, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'

    Persistence and Installation Behavior

    barindex
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exe
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exe
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exe
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile created: C:\Users\user\Documents\MSDCSC\msdcsc.exeJump to dropped file
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile created: C:\Users\user\AppData\Roaming\JXayEzy.exeJump to dropped file
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile created: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEJump to dropped file
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile created: C:\Users\user\Documents\MSDCSC\msdcsc.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmp12D0.tmp
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon UserInitJump to behavior
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\wscsvc
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run chromeJump to behavior
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run chromeJump to behavior

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\SysWOW64\notepad.exeFile deleted: c:\users\user\desktop\a1db2jvwgg.cnt.exe
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEFile opened: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE:Zone.Identifier read attributes | delete
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe TID: 7464Thread sleep time: -38157s >= -30000s
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe TID: 7480Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe TID: 7512Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7620Thread sleep count: 9151 > 30
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7792Thread sleep time: -2767011611056431s >= -30000s
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7828Thread sleep time: -2767011611056431s >= -30000s
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exe TID: 7812Thread sleep time: -38157s >= -30000s
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exe TID: 7932Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE TID: 5828Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE TID: 5884Thread sleep time: -640000s >= -30000s
    Source: C:\Windows\SysWOW64\notepad.exe TID: 7272Thread sleep time: -33000s >= -30000s
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exe TID: 5824Thread sleep time: -38157s >= -30000s
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exe TID: 7276Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exe TID: 7304Thread sleep time: -38157s >= -30000s
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exe TID: 3360Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exe TID: 5712Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8104Thread sleep count: 8724 > 30
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6216Thread sleep time: -4611686018427385s >= -30000s
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6220Thread sleep time: -2767011611056431s >= -30000s
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exe TID: 7040Thread sleep time: -4840000s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 7560Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE TID: 7180Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\SysWOW64\notepad.exe TID: 8140Thread sleep count: 160 > 30
    Source: C:\Windows\SysWOW64\notepad.exe TID: 8140Thread sleep time: -80000s >= -30000s
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exe TID: 5728Thread sleep time: -38157s >= -30000s
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exe TID: 5724Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeLast function: Thread delayed
    Source: C:\Windows\SysWOW64\notepad.exeLast function: Thread delayed
    Source: C:\Windows\SysWOW64\notepad.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9151
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9106
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWindow / User API: foregroundWindowGot 459
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWindow / User API: foregroundWindowGot 439
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8724
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8798
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeWindow / User API: threadDelayed 484
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeThread delayed: delay time: 38157
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeThread delayed: delay time: 38157
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeThread delayed: delay time: 38157
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeThread delayed: delay time: 38157
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeThread delayed: delay time: 38157
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile opened: C:\Users\user
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile opened: C:\Users\user\AppData
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile opened: C:\Users\user\AppData\Roaming
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000003.371680748.0000000008D60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:ymX
    Source: A1DB2JVWGG.CNT.exe, 0000000C.00000002.399046925.00000000013B8000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.422343833.0000000001367000.00000004.00000020.00020000.00000000.sdmp, msdcsc.exe, 00000020.00000002.621201902.0000000001008000.00000004.00000020.00020000.00000000.sdmp, msdcsc.exe, 00000027.00000002.465835536.0000000001108000.00000004.00000020.00020000.00000000.sdmp, msdcsc.exe, 0000002B.00000002.505886433.0000000000CF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess information queried: ProcessInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess token adjusted: Debug
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess token adjusted: Debug
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEProcess token adjusted: Debug
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess token adjusted: Debug
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory allocated: page read and write | page guard

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 9C0000 protect: page execute and read and write
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 9D0000 protect: page execute and read and write
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 8C0000 protect: page execute and read and write
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: D20000 protect: page execute and read and write
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: D70000 protect: page execute and read and write
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: D90000 protect: page execute and read and write
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 31B0000 protect: page execute and read and write
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 31C0000 protect: page execute and read and write
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 31D0000 protect: page execute and read and write
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 4920000 protect: page execute and read and write
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 4930000 protect: page execute and read and write
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 49C0000 protect: page execute and read and write
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 6620000 protect: page execute and read and write
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 6630000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 380000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 800000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 9A0000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 9B0000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: B70000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: B80000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: DC0000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 4240000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 4260000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 4850000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 4860000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 5AC0000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 5AD0000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 5AE0000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 5AF0000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 5B00000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 5B90000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 5BA0000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 5BB0000 protect: page execute and read and write
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Users\user\Documents\MSDCSC\msdcsc.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeThread created: C:\Windows\SysWOW64\notepad.exe EIP: 6630000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeThread created: C:\Windows\SysWOW64\notepad.exe EIP: 5BB0000
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\JXayEzy.exe
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\JXayEzy.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\JXayEzy.exe
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\JXayEzy.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 9C0000
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 9D0000
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 8C0000
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: D20000
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: D70000
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: D90000
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 31B0000
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 31C0000
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 31D0000
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 4920000
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 4930000
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 49C0000
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 6620000
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 6630000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 380000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 800000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 9A0000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 9B0000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: B70000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: B80000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: DC0000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 4240000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 4260000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 4850000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 4860000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 5AC0000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 5AD0000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 5AE0000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 5AF0000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 5B00000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 5B90000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 5BA0000
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 5BB0000
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\JXayEzy.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmp12D0.tmp
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe" +s +h
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop" +s +h
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE "C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE"
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe "C:\Users\user\Documents\MSDCSC\msdcsc.exe"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib "C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe" +s +h
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib "C:\Users\user\Desktop" +s +h
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\JXayEzy.exe
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmp5A49.tmp
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmp9C72.tmp
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE "C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE"
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmpE34F.tmp
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeProcess created: C:\Users\user\Documents\MSDCSC\msdcsc.exe C:\Users\user\Documents\MSDCSC\msdcsc.exe
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, msdcsc.exe, 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_traywndTrayNotifyWndTrayClockWClassjh<
    Source: JUNE STUB.EXE, 00000013.00000003.601968985.0000000006B32000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.613938133.0000000006B5B000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.474665549.0000000006B5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000035B0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerp
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, msdcsc.exe, 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndjjh
    Source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000036C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerT
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, msdcsc.exe, 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_traywndTrayNotifyWndjh
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, msdcsc.exe, 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ProgmanU
    Source: JUNE STUB.EXE, 00000013.00000003.615100465.00000000013A5000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.488108905.00000000013A4000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.572873799.00000000013A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerter2
    Source: JUNE STUB.EXE, 00000013.00000003.601968985.0000000006B32000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.587753773.0000000006B32000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000002.638759890.0000000006B32000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerD:{00000339-0000-0000-C000-000000000046} Flags:17 IID:{00000000-0000-0000-C000-000000000046}
    Source: JUNE STUB.EXE, 00000013.00000003.436993571.0000000001375000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.488108905.0000000001374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager\U
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, msdcsc.exe, 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_traywndReBarWindow32jh
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, msdcsc.exe, 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_traywndReBarWindow32jhD
    Source: JUNE STUB.EXE, 00000013.00000003.613938133.0000000006B30000.00000004.00000020.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000003.601968985.0000000006B30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managern has been aborted because of either a thread exit or an application request.
    Source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000035B0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerD
    Source: A1DB2JVWGG.CNT.exe, A1DB2JVWGG.CNT.exe, 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, msdcsc.exe, 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
    Source: A1DB2JVWGG.CNT.exe, A1DB2JVWGG.CNT.exe, 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, msdcsc.exe, 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Progman
    Source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000036C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerL
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, msdcsc.exe, 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Progmanjhh
    Source: msdcsc.exe, 00000020.00000002.621201902.0000000001034000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerQp,
    Source: msdcsc.exe, 00000020.00000002.621201902.0000000001034000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager@p=
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, msdcsc.exe, 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ButtonShell_TrayWndj
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, msdcsc.exe, 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_traywndTrayNotifyWndTrayClockWClassjh
    Source: A1DB2JVWGG.CNT.exe, A1DB2JVWGG.CNT.exe, 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, msdcsc.exe, 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_traywnd
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, msdcsc.exe, 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndPjjh
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,GetLocaleInfoA,LoadLibraryExA,LoadLibraryExA,
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeCode function: GetLocaleInfoA,LoadLibraryExA,LoadLibraryExA,
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeQueries volume information: C:\Users\user\AppData\Roaming\JXayEzy.exe VolumeInformation
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\AppData\Roaming\JXayEzy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\Users\user\Documents\MSDCSC\msdcsc.exe VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\Users\user\Documents\MSDCSC\msdcsc.exe VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\Users\user\Documents\MSDCSC\msdcsc.exe VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

    Lowering of HIPS / PFW / Operating System Security Settings

    barindex
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center AntiVirusDisableNotify
    Source: C:\Users\user\Documents\MSDCSC\msdcsc.exeRegistry key created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgr
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 22.2.msdcsc.exe.504a4f4.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3a22a45.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3a1e41c.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.JUNE STUB.EXE.5d10000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.msdcsc.exe.4b4dcb4.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.msdcsc.exe.4126b74.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3a1e41c.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.JUNE STUB.EXE.5d14629.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.JUNE STUB.EXE.5d10000.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.msdcsc.exe.504a4f4.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3a195e6.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.msdcsc.exe.4126b74.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000021.00000002.456486839.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000022.00000002.459239135.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000000.391419117.0000000000CC2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.637176007.0000000005D10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.470317430.0000000004126000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000021.00000002.454672045.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.397292430.00000000004A4000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000016.00000002.486347814.0000000005049000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: JUNE STUB.EXE PID: 8176, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: msdcsc.exe PID: 7264, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6384, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: JUNE STUB.EXE PID: 8152, type: MEMORYSTR
    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, type: DROPPED
    Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeDirectory queried: C:\Users\user\Documents\MSDCSC
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeDirectory queried: C:\Users\user\Documents
    Source: C:\Users\user\Desktop\A1DB2JVWGG.CNT.exeDirectory queried: C:\Users\user\Documents\MSDCSC

    Remote Access Functionality

    barindex
    Source: A1DB2JVWGG.CNT.exe, 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: A1DB2JVWGG.CNT.exe, 0000000C.00000002.397292430.00000000004A4000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.639756642.0000000006C60000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.640822750.0000000006D00000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: JUNE STUB.EXE, 00000013.00000002.640582585.0000000006CE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.639572623.0000000006C40000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.639572623.0000000006C40000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: JUNE STUB.EXE, 00000013.00000002.639327601.0000000006C10000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.640048341.0000000006C80000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.640048341.0000000006C80000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: JUNE STUB.EXE, 00000013.00000000.391419117.0000000000CC2000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.640453706.0000000006CD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.640195396.0000000006CA0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.639417055.0000000006C20000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.640312728.0000000006CB0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.640312728.0000000006CB0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: JUNE STUB.EXE, 00000013.00000002.640130436.0000000006C90000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.640130436.0000000006C90000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: JUNE STUB.EXE, 00000013.00000002.631531483.0000000004515000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.637176007.0000000005D10000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000033A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.625066874.00000000033A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: JUNE STUB.EXE, 00000013.00000002.641220331.0000000006D30000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.631531483.000000000441F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.636982367.0000000005A80000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000013.00000002.636982367.0000000005A80000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: msdcsc.exe, 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: msdcsc.exe, 00000016.00000002.486347814.0000000005049000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 00000021.00000002.456486839.00000000039D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 00000021.00000002.456486839.00000000039D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: dhcpmon.exe, 00000021.00000002.454672045.00000000029D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 00000021.00000002.454672045.00000000029D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: JUNE STUB.EXE, 00000022.00000002.459239135.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: JUNE STUB.EXE, 00000022.00000002.459239135.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: JUNE STUB.EXE.12.drString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe.19.drString found in binary or memory: NanoCore.ClientPluginHost
    Source: Yara matchFile source: 22.2.msdcsc.exe.504a4f4.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3a22a45.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3a1e41c.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.JUNE STUB.EXE.5d10000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.msdcsc.exe.4b4dcb4.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4b1b0d4.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.msdcsc.exe.4126b74.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.msdcsc.exe.4b4dcb4.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3a1e41c.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.JUNE STUB.EXE.5d14629.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.A1DB2JVWGG.CNT.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.0.JUNE STUB.EXE.cc0000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.JUNE STUB.EXE.5d10000.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4a4e894.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.A1DB2JVWGG.CNT.exe.4ad84c.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.msdcsc.exe.504a4f4.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3a195e6.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.msdcsc.exe.4126b74.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.4886c28.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.A1DB2JVWGG.CNT.exe.41a691c.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000021.00000002.456486839.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000022.00000002.459239135.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000000.391419117.0000000000CC2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.637176007.0000000005D10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.470317430.0000000004126000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000021.00000002.454672045.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.397292430.00000000004A4000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000016.00000002.486347814.0000000005049000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7460, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: A1DB2JVWGG.CNT.exe PID: 7948, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: JUNE STUB.EXE PID: 8176, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: msdcsc.exe PID: 5860, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: msdcsc.exe PID: 7264, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6384, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: JUNE STUB.EXE PID: 8152, type: MEMORYSTR
    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, type: DROPPED
    Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Windows Management Instrumentation
    1
    LSASS Driver
    1
    LSASS Driver
    31
    Disable or Modify Tools
    121
    Input Capture
    12
    File and Directory Discovery
    Remote Services11
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default Accounts1
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    11
    Deobfuscate/Decode Files or Information
    LSASS Memory22
    System Information Discovery
    Remote Desktop Protocol1
    Data from Local System
    Exfiltration Over Bluetooth1
    Non-Standard Port
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain Accounts1
    Scheduled Task/Job
    1
    Windows Service
    1
    Access Token Manipulation
    4
    Obfuscated Files or Information
    Security Account Manager111
    Security Software Discovery
    SMB/Windows Admin Shares121
    Input Capture
    Automated Exfiltration1
    Remote Access Software
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)1
    Scheduled Task/Job
    1
    Windows Service
    13
    Software Packing
    NTDS2
    Process Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer1
    Non-Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCron11
    Registry Run Keys / Startup Folder
    412
    Process Injection
    1
    DLL Side-Loading
    LSA Secrets21
    Virtualization/Sandbox Evasion
    SSHKeyloggingData Transfer Size Limits21
    Application Layer Protocol
    Manipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.common1
    Scheduled Task/Job
    1
    File Deletion
    Cached Domain Credentials1
    Application Window Discovery
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup Items11
    Registry Run Keys / Startup Folder
    2
    Masquerading
    DCSync1
    Remote System Discovery
    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job21
    Virtualization/Sandbox Evasion
    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
    Access Token Manipulation
    /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
    Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)412
    Process Injection
    Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
    Compromise Software Dependencies and Development ToolsWindows Command ShellCronCron1
    Hidden Files and Directories
    Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 880328 Sample: A1DB2JVWGG.CNT.exe Startdate: 02/06/2023 Architecture: WINDOWS Score: 100 112 Snort IDS alert for network traffic 2->112 114 Multi AV Scanner detection for domain / URL 2->114 116 Found malware configuration 2->116 118 14 other signatures 2->118 9 A1DB2JVWGG.CNT.exe 7 2->9         started        13 JXayEzy.exe 3 2->13         started        15 msdcsc.exe 2->15         started        17 2 other processes 2->17 process3 file4 94 C:\Users\user\AppData\Roaming\JXayEzy.exe, PE32 9->94 dropped 96 C:\Users\user\...\JXayEzy.exe:Zone.Identifier, ASCII 9->96 dropped 98 C:\Users\user\AppData\Local\...\tmp12D0.tmp, XML 9->98 dropped 100 C:\Users\user\...\A1DB2JVWGG.CNT.exe.log, ASCII 9->100 dropped 140 Drops PE files to the document folder of the user 9->140 142 Uses schtasks.exe or at.exe to add and modify task schedules 9->142 144 Adds a directory exclusion to Windows Defender 9->144 19 A1DB2JVWGG.CNT.exe 1 5 9->19         started        23 powershell.exe 19 9->23         started        25 powershell.exe 21 9->25         started        37 4 other processes 9->37 146 Multi AV Scanner detection for dropped file 13->146 148 Machine Learning detection for dropped file 13->148 150 Injects a PE file into a foreign processes 15->150 27 schtasks.exe 15->27         started        29 msdcsc.exe 15->29         started        31 msdcsc.exe 15->31         started        33 schtasks.exe 17->33         started        35 msdcsc.exe 17->35         started        signatures5 process6 file7 88 C:\Users\user\Documents\MSDCSC\msdcsc.exe, PE32 19->88 dropped 90 C:\Users\user\AppData\Local\...\JUNE STUB.EXE, PE32 19->90 dropped 92 C:\Users\user\...\msdcsc.exe:Zone.Identifier, ASCII 19->92 dropped 120 Creates an undocumented autostart registry key 19->120 122 Writes to foreign memory regions 19->122 124 Allocates memory in foreign processes 19->124 126 Creates a thread in another existing process (thread injection) 19->126 39 msdcsc.exe 19->39         started        42 JUNE STUB.EXE 19->42         started        46 cmd.exe 19->46         started        58 2 other processes 19->58 48 conhost.exe 23->48         started        50 conhost.exe 25->50         started        52 conhost.exe 27->52         started        54 conhost.exe 33->54         started        56 conhost.exe 37->56         started        signatures8 process9 dnsIp10 128 Multi AV Scanner detection for dropped file 39->128 130 Machine Learning detection for dropped file 39->130 132 Adds a directory exclusion to Windows Defender 39->132 60 msdcsc.exe 39->60         started        64 powershell.exe 39->64         started        66 powershell.exe 39->66         started        76 2 other processes 39->76 106 timmy08.ddns.net 5.252.165.230, 28289, 39399, 49702 RIXCLOUD-INCUS United States 42->106 108 192.168.2.1 unknown unknown 42->108 102 C:\Program Files (x86)\...\dhcpmon.exe, PE32 42->102 dropped 104 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 42->104 dropped 134 Hides that the sample has been downloaded from the Internet (zone.identifier) 42->134 136 Uses cmd line tools excessively to alter registry or file data 46->136 68 conhost.exe 46->68         started        70 attrib.exe 46->70         started        138 Deletes itself after installation 58->138 72 conhost.exe 58->72         started        74 attrib.exe 58->74         started        file11 signatures12 process13 dnsIp14 110 timmy08.ddns.net 60->110 152 Changes security center settings (notifications, updates, antivirus, firewall) 60->152 154 Writes to foreign memory regions 60->154 156 Allocates memory in foreign processes 60->156 158 3 other signatures 60->158 78 JUNE STUB.EXE 60->78         started        80 notepad.exe 60->80         started        82 conhost.exe 64->82         started        84 conhost.exe 66->84         started        86 conhost.exe 76->86         started        signatures15 process16

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    A1DB2JVWGG.CNT.exe22%ReversingLabsWin32.Trojan.Generic
    A1DB2JVWGG.CNT.exe30%VirustotalBrowse
    A1DB2JVWGG.CNT.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE100%AviraTR/Dropper.MSIL.Gen7
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%AviraTR/Dropper.MSIL.Gen7
    C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE100%Joe Sandbox ML
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
    C:\Users\user\Documents\MSDCSC\msdcsc.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Roaming\JXayEzy.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Roaming\JXayEzy.exe27%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\Documents\MSDCSC\msdcsc.exe27%ReversingLabsWin32.Trojan.Generic
    No Antivirus matches
    SourceDetectionScannerLabelLink
    timmy08.ddns.net13%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://www.founder.com.cn/cnK0%URL Reputationsafe
    http://www.founder.com.cn/cnK0%URL Reputationsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/H0%URL Reputationsafe
    http://www.founder.com.cn/cnU0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/30%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/30%URL Reputationsafe
    http://www.founder.com.cn/cnw0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/m0%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/%0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    http://www.founder.com.cn/cnd0%URL Reputationsafe
    http://www.carterandcone.comtig0%URL Reputationsafe
    http://www.founder.com.cn/cn/H0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/A0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
    http://en.wikip0%URL Reputationsafe
    http://www.carterandcone.comto0%URL Reputationsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.founder.com.cn/cn-0%URL Reputationsafe
    http://www.founder.com.cn/cn90%URL Reputationsafe
    http://www.fontbureau.comm0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/_0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/_0%URL Reputationsafe
    http://www.fontbureau.comceu30%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/r-f0%Avira URL Cloudsafe
    timmy06.ddns.net100%Avira URL Cloudmalware
    timmy08.ddns.net100%Avira URL Cloudmalware
    timmy08.ddns.net13%VirustotalBrowse
    http://www.jiyu-kobo.co.jp/r-f0%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    timmy08.ddns.net
    5.252.165.230
    truetrueunknown
    NameMaliciousAntivirus DetectionReputation
    timmy08.ddns.nettrue
    • 13%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    timmy06.ddns.nettrue
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.fontbureau.com/designersGA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.founder.com.cn/cnKA1DB2JVWGG.CNT.exe, 00000000.00000003.358248155.0000000005DBC000.00000004.00000020.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://www.fontbureau.com/designers/?A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.fontbureau.comceu3A1DB2JVWGG.CNT.exe, 00000000.00000003.384541193.0000000005DB0000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.founder.com.cn/cn/bTheA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.fontbureau.com/designers?A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.jiyu-kobo.co.jp/jp/HA1DB2JVWGG.CNT.exe, 00000000.00000003.359124042.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.359247918.0000000005DB7000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.founder.com.cn/cnUA1DB2JVWGG.CNT.exe, 00000000.00000003.358248155.0000000005DBC000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.358336012.0000000005DBC000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.tiro.comA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com/designersA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.goodfont.co.krA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://google.comJUNE STUB.EXE, 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp, JUNE STUB.EXE, 00000013.00000002.640195396.0000000006CA0000.00000004.08000000.00040000.00000000.sdmpfalse
              high
              http://www.sajatypeworks.comA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.typography.netDA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cn/cTheA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.galapagosdesign.com/staff/dennis.htmA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://fontfabrik.comA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.jiyu-kobo.co.jp/3A1DB2JVWGG.CNT.exe, 00000000.00000003.359124042.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.359247918.0000000005DB7000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.jiyu-kobo.co.jp/r-fA1DB2JVWGG.CNT.exe, 00000000.00000003.359124042.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.359247918.0000000005DB7000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://www.founder.com.cn/cnwA1DB2JVWGG.CNT.exe, 00000000.00000003.358248155.0000000005DBC000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.358336012.0000000005DBC000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.jiyu-kobo.co.jp/jp/mA1DB2JVWGG.CNT.exe, 00000000.00000003.359124042.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.359247918.0000000005DB7000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.galapagosdesign.com/DPleaseA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fonts.comA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.jiyu-kobo.co.jp/%A1DB2JVWGG.CNT.exe, 00000000.00000003.359124042.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.359247918.0000000005DB7000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.sandoll.co.krA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.urwpp.deDPleaseA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.zhongyicts.com.cnA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameA1DB2JVWGG.CNT.exe, 00000000.00000002.392562881.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, msdcsc.exe, 00000015.00000002.442690195.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, msdcsc.exe, 00000016.00000002.475372371.00000000033B7000.00000004.00000800.00020000.00000000.sdmp, msdcsc.exe, 00000024.00000002.512029267.0000000003097000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.sakkal.comA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.founder.com.cn/cndA1DB2JVWGG.CNT.exe, 00000000.00000003.358248155.0000000005DBC000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.carterandcone.comtigA1DB2JVWGG.CNT.exe, 00000000.00000003.358704115.0000000005DB3000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.apache.org/licenses/LICENSE-2.0A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.comA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.384541193.0000000005DB0000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/HA1DB2JVWGG.CNT.exe, 00000000.00000003.358336012.0000000005DBC000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/AA1DB2JVWGG.CNT.exe, 00000000.00000003.359124042.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.359247918.0000000005DB7000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/jp/A1DB2JVWGG.CNT.exe, 00000000.00000003.359124042.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.359247918.0000000005DB7000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://en.wikipA1DB2JVWGG.CNT.exe, 00000000.00000003.358071188.0000000005DBE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comtoA1DB2JVWGG.CNT.exe, 00000000.00000003.358704115.0000000005DB3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cnA1DB2JVWGG.CNT.exe, 00000000.00000003.358248155.0000000005DBC000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.358336012.0000000005DBC000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-jones.htmlA1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cn-A1DB2JVWGG.CNT.exe, 00000000.00000003.358248155.0000000005DBC000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.358336012.0000000005DBC000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cn9A1DB2JVWGG.CNT.exe, 00000000.00000003.358248155.0000000005DBC000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.358336012.0000000005DBC000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.commA1DB2JVWGG.CNT.exe, 00000000.00000002.441627539.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.384541193.0000000005DB0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/A1DB2JVWGG.CNT.exe, 00000000.00000003.359124042.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.359247918.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers8A1DB2JVWGG.CNT.exe, 00000000.00000002.441824981.0000000006EC2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/_A1DB2JVWGG.CNT.exe, 00000000.00000003.359124042.0000000005DB7000.00000004.00000020.00020000.00000000.sdmp, A1DB2JVWGG.CNT.exe, 00000000.00000003.359247918.0000000005DB7000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            5.252.165.230
                            timmy08.ddns.netUnited States
                            64271RIXCLOUD-INCUStrue
                            IP
                            192.168.2.1
                            Joe Sandbox Version:37.1.0 Beryl
                            Analysis ID:880328
                            Start date and time:2023-06-02 02:25:31 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 10m 57s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:46
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample file name:A1DB2JVWGG.CNT.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@67/28@15/2
                            EGA Information:
                            • Successful, ratio: 100%
                            HDC Information:
                            • Successful, ratio: 99.9% (good quality ratio 90.6%)
                            • Quality average: 72.7%
                            • Quality standard deviation: 31.8%
                            HCA Information:
                            • Successful, ratio: 98%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, WmiPrvSE.exe
                            • TCP Packets have been reduced to 100
                            • Not all processes where analyzed, report is missing behavior information
                            • Report creation exceeded maximum time and may have missing disassembly code information.
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtDeviceIoControlFile calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            02:26:28API Interceptor2x Sleep call for process: A1DB2JVWGG.CNT.exe modified
                            02:26:32Task SchedulerRun new task: JXayEzy path: C:\Users\user\AppData\Roaming\JXayEzy.exe
                            02:26:32API Interceptor131x Sleep call for process: powershell.exe modified
                            02:26:39AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run chrome C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            02:26:41API Interceptor459x Sleep call for process: JUNE STUB.EXE modified
                            02:26:46API Interceptor752x Sleep call for process: msdcsc.exe modified
                            02:26:47AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            02:26:57AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run chrome C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            02:27:03API Interceptor1x Sleep call for process: JXayEzy.exe modified
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):207360
                            Entropy (8bit):7.448476558203999
                            Encrypted:false
                            SSDEEP:6144:gLV6Bta6dtJmakIM5W4w9QT09e8iCp1Tz5kl7:gLV6BtpmkjIIc8iCp1P5kl7
                            MD5:4D9AC7D6E684CD3874B662971B6BC536
                            SHA1:726CD96B680082910EBC451D7741A2D6934ED339
                            SHA-256:48987956556721DFB5F988683693BEBC094B5965F6BD58EEFF928FD7C6BA9330
                            SHA-512:27DDC60B921ED3B6B9223321EA310FA6CE9A3F4D0CB1B96899FC8FB08556D73F92FB3EC7DA93A60DE046105129B1B128828D5AB57869160749A5F7F2A7A8AB71
                            Malicious:true
                            Yara Hits:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth (Nextron Systems)
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Joe Security
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: ditekSHen
                            • Rule: NanoCore, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: unknown
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T.....................`........... ........@.. ......................................................................8...W.... ...]........................................................................... ............... ..H............text........ ...................... ..`.reloc..............................@..B.rsrc....]... ...^..................@..@................t.......H...........T............................................................0..Q........o5.......*.o6....-.&......3+..+.... ....3......1..... 2.... ....3.... .......*.*....0..E.......s7....-(&s8....-&&s9....,$&s:........s;........*.....+.....+.....+.....0..........~....o<...*..0..........~....o=...*..0..........~....o>...*..0..........~....o?...*..0..........~....o@...*..0.............-.&(A...*&+...0..$.......~B........-.(...+.-.&+..B...+.~B...*.0.............-.&(A...*&+...0..
                            Process:C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):525
                            Entropy (8bit):5.2874233355119316
                            Encrypted:false
                            SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                            MD5:61CCF53571C9ABA6511D696CB0D32E45
                            SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                            SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                            SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                            Malicious:false
                            Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):525
                            Entropy (8bit):5.2874233355119316
                            Encrypted:false
                            SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                            MD5:61CCF53571C9ABA6511D696CB0D32E45
                            SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                            SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                            SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                            Malicious:false
                            Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                            Process:C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:modified
                            Size (bytes):1302
                            Entropy (8bit):5.3499841584777394
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84bE4Ks:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                            MD5:4664C2114894A4BFC1E657FC08C72FF4
                            SHA1:95A1E14E2AD65BCA561261DA3899074BF5276AED
                            SHA-256:6E36229D13672B4304C696812B365F2E5657875DD0E11F13AE010566CC87607A
                            SHA-512:4E7862716D5C0BC2174E819BAB329A2974FE83A36D5417EE732AB2F3D77D95620B3D462A1C9608F5FE90A48030140DE53DB642F8C370CD8E191BDBE83C638CA1
                            Malicious:true
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                            Process:C:\Users\user\AppData\Roaming\JXayEzy.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.355304211458859
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                            MD5:FED34146BF2F2FA59DCF8702FCC8232E
                            SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                            SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                            SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                            Malicious:false
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                            Process:C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1302
                            Entropy (8bit):5.3499841584777394
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84bE4Ks:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                            MD5:4664C2114894A4BFC1E657FC08C72FF4
                            SHA1:95A1E14E2AD65BCA561261DA3899074BF5276AED
                            SHA-256:6E36229D13672B4304C696812B365F2E5657875DD0E11F13AE010566CC87607A
                            SHA-512:4E7862716D5C0BC2174E819BAB329A2974FE83A36D5417EE732AB2F3D77D95620B3D462A1C9608F5FE90A48030140DE53DB642F8C370CD8E191BDBE83C638CA1
                            Malicious:false
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):21860
                            Entropy (8bit):5.5972826889109575
                            Encrypted:false
                            SSDEEP:384:WtCRLq0DKA7vZF+0oj8nYSBxouleWiJ9glSJ3uyzSv0ZqbAVrd3sffBT+iRYc:5V0diY4iuleOlcuBs4wk+c
                            MD5:0053A5FE80C85D084F9273222792DE1C
                            SHA1:E9518C301A6C283676FF55B86C23831F40AF019E
                            SHA-256:22B5F051CEE4CC570A86DB41F8F1ADADEF798462A25C27A8B7B7AA382288881A
                            SHA-512:3BC8313C2DBE0AF84FB75700F85E81A79BD58F65AB9694DA7D09B5FC392CC8316F779036E242658BF691BC5752F980881763DBC3A9D58C5350A95668D6347012
                            Malicious:false
                            Preview:@...e...................c.f...............D..........@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                            Process:C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:modified
                            Size (bytes):207360
                            Entropy (8bit):7.448476558203999
                            Encrypted:false
                            SSDEEP:6144:gLV6Bta6dtJmakIM5W4w9QT09e8iCp1Tz5kl7:gLV6BtpmkjIIc8iCp1P5kl7
                            MD5:4D9AC7D6E684CD3874B662971B6BC536
                            SHA1:726CD96B680082910EBC451D7741A2D6934ED339
                            SHA-256:48987956556721DFB5F988683693BEBC094B5965F6BD58EEFF928FD7C6BA9330
                            SHA-512:27DDC60B921ED3B6B9223321EA310FA6CE9A3F4D0CB1B96899FC8FB08556D73F92FB3EC7DA93A60DE046105129B1B128828D5AB57869160749A5F7F2A7A8AB71
                            Malicious:true
                            Yara Hits:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, Author: Florian Roth (Nextron Systems)
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, Author: Joe Security
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, Author: ditekSHen
                            • Rule: NanoCore, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, Author: unknown
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T.....................`........... ........@.. ......................................................................8...W.... ...]........................................................................... ............... ..H............text........ ...................... ..`.reloc..............................@..B.rsrc....]... ...^..................@..@................t.......H...........T............................................................0..Q........o5.......*.o6....-.&......3+..+.... ....3......1..... 2.... ....3.... .......*.*....0..E.......s7....-(&s8....-&&s9....,$&s:........s;........*.....+.....+.....+.....0..........~....o<...*..0..........~....o=...*..0..........~....o>...*..0..........~....o?...*..0..........~....o@...*..0.............-.&(A...*&+...0..$.......~B........-.(...+.-.&+..B...+.~B...*.0.............-.&(A...*&+...0..
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview:1
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview:1
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview:1
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview:1
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview:1
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview:1
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview:1
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview:1
                            Process:C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1594
                            Entropy (8bit):5.151574547335532
                            Encrypted:false
                            SSDEEP:24:2di4+S2qh/Q1K1y1mokUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtSxvn:cge4MYrFdOFzOzN33ODOiDdKrsuTWv
                            MD5:B8801377A791997FBC93D3EDC361C57F
                            SHA1:CBC782BC13AAD45C48C7DE025F1478F065FF38BB
                            SHA-256:EBBCB00843283918F69415DF2D0FE78D7239527A592F03E65F296EEE3F9FB4E4
                            SHA-512:4A68B1BED4CEDE648A1AD0BE535DB587844AE8D69E742C49DA0F3EE0B01F3F983E96F21F77CE9CE69BC3204F57AA91B289253E25FF118B74FCDC1329A4004C49
                            Malicious:true
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                            Process:C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1594
                            Entropy (8bit):5.151574547335532
                            Encrypted:false
                            SSDEEP:24:2di4+S2qh/Q1K1y1mokUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtSxvn:cge4MYrFdOFzOzN33ODOiDdKrsuTWv
                            MD5:B8801377A791997FBC93D3EDC361C57F
                            SHA1:CBC782BC13AAD45C48C7DE025F1478F065FF38BB
                            SHA-256:EBBCB00843283918F69415DF2D0FE78D7239527A592F03E65F296EEE3F9FB4E4
                            SHA-512:4A68B1BED4CEDE648A1AD0BE535DB587844AE8D69E742C49DA0F3EE0B01F3F983E96F21F77CE9CE69BC3204F57AA91B289253E25FF118B74FCDC1329A4004C49
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                            Process:C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1594
                            Entropy (8bit):5.151574547335532
                            Encrypted:false
                            SSDEEP:24:2di4+S2qh/Q1K1y1mokUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtSxvn:cge4MYrFdOFzOzN33ODOiDdKrsuTWv
                            MD5:B8801377A791997FBC93D3EDC361C57F
                            SHA1:CBC782BC13AAD45C48C7DE025F1478F065FF38BB
                            SHA-256:EBBCB00843283918F69415DF2D0FE78D7239527A592F03E65F296EEE3F9FB4E4
                            SHA-512:4A68B1BED4CEDE648A1AD0BE535DB587844AE8D69E742C49DA0F3EE0B01F3F983E96F21F77CE9CE69BC3204F57AA91B289253E25FF118B74FCDC1329A4004C49
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                            Process:C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1594
                            Entropy (8bit):5.151574547335532
                            Encrypted:false
                            SSDEEP:24:2di4+S2qh/Q1K1y1mokUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtSxvn:cge4MYrFdOFzOzN33ODOiDdKrsuTWv
                            MD5:B8801377A791997FBC93D3EDC361C57F
                            SHA1:CBC782BC13AAD45C48C7DE025F1478F065FF38BB
                            SHA-256:EBBCB00843283918F69415DF2D0FE78D7239527A592F03E65F296EEE3F9FB4E4
                            SHA-512:4A68B1BED4CEDE648A1AD0BE535DB587844AE8D69E742C49DA0F3EE0B01F3F983E96F21F77CE9CE69BC3204F57AA91B289253E25FF118B74FCDC1329A4004C49
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                            Process:C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE
                            File Type:data
                            Category:dropped
                            Size (bytes):232
                            Entropy (8bit):7.024371743172393
                            Encrypted:false
                            SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                            MD5:32D0AAE13696FF7F8AF33B2D22451028
                            SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                            SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                            SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                            Malicious:false
                            Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                            Process:C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE
                            File Type:Non-ISO extended-ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):8
                            Entropy (8bit):3.0
                            Encrypted:false
                            SSDEEP:3:eWt:eWt
                            MD5:628DD28222B41ED590BE807455B900F4
                            SHA1:B2D20B6D905CDFA73EE48A63D68CDBC2CB95544E
                            SHA-256:F55D454E585D202858EA0F2DC330BC6D72C2A80B89E8D307C1CDD1D007FDAA9B
                            SHA-512:8FA90F6F764BD6504218CF1DC312B0CA15423B83386339D3030CEA23D33966B5C3F638A27D38DA418767BDC765EA9D409BE340D9DF76D726878BF85EA95C0AE4
                            Malicious:true
                            Preview:m.qyKc.H
                            Process:C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE
                            File Type:data
                            Category:dropped
                            Size (bytes):40
                            Entropy (8bit):5.153055907333276
                            Encrypted:false
                            SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                            MD5:4E5E92E2369688041CC82EF9650EDED2
                            SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                            SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                            SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                            Malicious:false
                            Preview:9iH...}Z.4..f.~a........~.~.......3.U.
                            Process:C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE
                            File Type:data
                            Category:dropped
                            Size (bytes):426840
                            Entropy (8bit):7.999608491116724
                            Encrypted:true
                            SSDEEP:12288:zKf137EiDsTjevgA4p0V7njXuWSvdVU7V4OC0Rr:+134i2lp67i5d8+OCg
                            MD5:963D5E2C9C0008DFF05518B47C367A7F
                            SHA1:C183D601FABBC9AC8FBFA0A0937DECC677535E74
                            SHA-256:5EACF2974C9BB2C2E24CDC651C4840DD6F4B76A98F0E85E90279F1DBB2E6F3C0
                            SHA-512:0C04E1C1A13070D48728D9F7F300D9B26DEC6EC8875D8D3017EAD52B9EE5BDF9B651A7F0FCC537761212831107646ED72B8ED017E7477E600BC0137EF857AE2C
                            Malicious:false
                            Preview:..g&jo...IPg...GM....R>i...o...I.>.&.r{....8...}...E....v.!7.u3e.. .....db...}.......".t(.xC9.cp.B....7...'.......%......w.^.._.......B.W%.<..i.0.{9.xS...5...)..w..$..C..?`F..u.5.T.X.w'Si..z.n{...Y!m...RA...xg....[7...z..9@.K.-...T..+.ACe....R....enO.....AoNMT.\^....}H&..4I...B.:..@..J...v..rI5..kP......2j....B..B.~.T..>.c..emW;Rn<9..[.r.o....R[....@=...:...L.g<.....I..%4[.G^.~.l'......v.p&.........+..S...9d/.{..H.`@.1..........f.\s...X.a.].<.h*...J4*...k.x....%3.......3.c..?%....>.!.}..)(.{...H...3..`'].Q.[sN..JX(.%pH....+......(...v.....H...3..8.a_..J..?4...y.N(..D.*h..g.jD..I...44Q?..N......oX.A......l...n?./..........$.!..;.^9"H........*...OkF....v.m_.e.v..f...."..bq{.....O.-....%R+...-..P.i..t5....2Z# ...#...,L..{..j..heT -=Z.P;...g.m)<owJ].J..../.p..8.u8.&..#.m9...j%..g&....g.x.I,....u.[....>./W...........*X...b*Z...ex.0..x.}.....Tb...[..H_M._.^N.d&...g._."@4N.pDs].GbT.......&p........Nw...%$=.....{..J.1....2....<E{..<!G..
                            Process:C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):2223104
                            Entropy (8bit):7.68131929551722
                            Encrypted:false
                            SSDEEP:24576:tA74/4qimDN0nixgBQcZ+WtGsK0i+CqBRCJcbpaa4S7qeL7pjhlyIy6Vs6wGpYUa:tA74/t6FQcZ+WRs+BRL4ShjTyIF
                            MD5:A7817732EDED62797B0C5E9DA109EDD7
                            SHA1:E7E868E8A529CDD6BD32B4FA3711EFF0C9029DBB
                            SHA-256:95969E3E0C1793E6177D5C5D20C9A667C9F28BB64907AD489682C41668EFC29D
                            SHA-512:3664953E0E5C601E8D8123C0B9F3F43D727BF6F48F81A93FED051D6F0D275728CEDA92ECEF201E4CDCEAC29C17CE66B46820A43A6DAC9FD4B77B6D54F226DB01
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 27%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...F.xd..............0..F...........e... ........@.. .......................`"...........@.................................<e..O.......,....................@".....\&..T............................................ ............... ..H............text....E... ...F.................. ..`.rsrc...,............H..............@..@.reloc.......@".......!.............@..B................pe......H........K..$...........$...8/...........................................0..)........{.........(....t......|......(...+...3.*....0..)........{.........(....t......|......(...+...3.*...}......}.....(.......(......{....o....&*.0..$........r...pr7..p.. (...........,..(.....*.0............{....o....&.{.....o......{....( ...o!.....{....( ...o!.....{....( ...o!.....{....( ...o!.....{....( ...o!.....{....( ...o!.....{....( ...o!....*...0..-.........{....o".....,..{.....o.....+..{...
                            Process:C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Preview:[ZoneTransfer]....ZoneId=0
                            Process:C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):2223104
                            Entropy (8bit):7.68131929551722
                            Encrypted:false
                            SSDEEP:24576:tA74/4qimDN0nixgBQcZ+WtGsK0i+CqBRCJcbpaa4S7qeL7pjhlyIy6Vs6wGpYUa:tA74/t6FQcZ+WRs+BRL4ShjTyIF
                            MD5:A7817732EDED62797B0C5E9DA109EDD7
                            SHA1:E7E868E8A529CDD6BD32B4FA3711EFF0C9029DBB
                            SHA-256:95969E3E0C1793E6177D5C5D20C9A667C9F28BB64907AD489682C41668EFC29D
                            SHA-512:3664953E0E5C601E8D8123C0B9F3F43D727BF6F48F81A93FED051D6F0D275728CEDA92ECEF201E4CDCEAC29C17CE66B46820A43A6DAC9FD4B77B6D54F226DB01
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 27%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...F.xd..............0..F...........e... ........@.. .......................`"...........@.................................<e..O.......,....................@".....\&..T............................................ ............... ..H............text....E... ...F.................. ..`.rsrc...,............H..............@..@.reloc.......@".......!.............@..B................pe......H........K..$...........$...8/...........................................0..)........{.........(....t......|......(...+...3.*....0..)........{.........(....t......|......(...+...3.*...}......}.....(.......(......{....o....&*.0..$........r...pr7..p.. (...........,..(.....*.0............{....o....&.{.....o......{....( ...o!.....{....( ...o!.....{....( ...o!.....{....( ...o!.....{....( ...o!.....{....( ...o!.....{....( ...o!....*...0..-.........{....o".....,..{.....o.....+..{...
                            Process:C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Preview:[ZoneTransfer]....ZoneId=0
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.68131929551722
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                            • Win32 Executable (generic) a (10002005/4) 49.78%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            • DOS Executable Generic (2002/1) 0.01%
                            File name:A1DB2JVWGG.CNT.exe
                            File size:2223104
                            MD5:a7817732eded62797b0c5e9da109edd7
                            SHA1:e7e868e8a529cdd6bd32b4fa3711eff0c9029dbb
                            SHA256:95969e3e0c1793e6177d5c5d20c9a667c9f28bb64907ad489682c41668efc29d
                            SHA512:3664953e0e5c601e8d8123c0b9f3f43d727bf6f48f81a93fed051d6f0d275728ceda92ecef201e4cdceac29c17ce66b46820a43a6dac9fd4b77b6d54f226db01
                            SSDEEP:24576:tA74/4qimDN0nixgBQcZ+WtGsK0i+CqBRCJcbpaa4S7qeL7pjhlyIy6Vs6wGpYUa:tA74/t6FQcZ+WRs+BRL4ShjTyIF
                            TLSH:FDA5D000DABBCDDCC4760E780034163116B79F62586FE3C8997579B9E8787C2A684E7B
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...F.xd..............0..F...........e... ........@.. .......................`"...........@................................
                            Icon Hash:cfc3ce4cccccc74f
                            Entrypoint:0x5b658e
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x6478F346 [Thu Jun 1 19:36:38 2023 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x1b653c0x4f.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1b80000x6a02c.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x2240000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x1b265c0x54.text
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000x1b45940x1b4600False0.9364711266470925data7.897532048001292IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0x1b80000x6a02c0x6a200False0.2072359945524146data5.854806072192783IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x2240000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountry
                            RT_ICON0x1b82b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024
                            RT_ICON0x1b87180x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304
                            RT_ICON0x1b90a00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096
                            RT_ICON0x1ba1480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216
                            RT_ICON0x1bc6f00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384
                            RT_ICON0x1c09180x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736
                            RT_ICON0x1c5da00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864
                            RT_ICON0x1cf2480x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536
                            RT_ICON0x1dfa700x42028Device independent bitmap graphic, 256 x 512 x 32, image size 262144
                            RT_GROUP_ICON0x221a980x84data
                            RT_VERSION0x221b1c0x324data
                            RT_MANIFEST0x221e400x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                            DLLImport
                            mscoree.dll_CorExeMain
                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                            192.168.2.35.252.165.23049702282892025019 06/02/23-02:26:44.385767TCP2025019ET TROJAN Possible NanoCore C2 60B4970228289192.168.2.35.252.165.230
                            5.252.165.230192.168.2.339399497042806577 06/02/23-02:27:01.218517TCP2806577ETPRO TROJAN DarkComet-RAT init connection 239399497045.252.165.230192.168.2.3
                            192.168.2.35.252.165.23049711282892025019 06/02/23-02:27:54.203652TCP2025019ET TROJAN Possible NanoCore C2 60B4971128289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049713282892025019 06/02/23-02:28:03.961219TCP2025019ET TROJAN Possible NanoCore C2 60B4971328289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049705282892025019 06/02/23-02:27:16.433852TCP2025019ET TROJAN Possible NanoCore C2 60B4970528289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049712282892025019 06/02/23-02:27:59.459924TCP2025019ET TROJAN Possible NanoCore C2 60B4971228289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049716282892025019 06/02/23-02:28:22.359438TCP2025019ET TROJAN Possible NanoCore C2 60B4971628289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049706282892025019 06/02/23-02:27:24.140871TCP2025019ET TROJAN Possible NanoCore C2 60B4970628289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049708282892025019 06/02/23-02:27:35.526983TCP2025019ET TROJAN Possible NanoCore C2 60B4970828289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049707282892025019 06/02/23-02:27:28.447502TCP2025019ET TROJAN Possible NanoCore C2 60B4970728289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049713282892816718 06/02/23-02:28:05.016410TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon4971328289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049702282892816718 06/02/23-02:26:45.935768TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon4970228289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049710282892025019 06/02/23-02:27:47.888873TCP2025019ET TROJAN Possible NanoCore C2 60B4971028289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049708282892816766 06/02/23-02:27:36.099395TCP2816766ETPRO TROJAN NanoCore RAT CnC 74970828289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049707282892816766 06/02/23-02:27:29.300655TCP2816766ETPRO TROJAN NanoCore RAT CnC 74970728289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049709282892816766 06/02/23-02:27:43.508322TCP2816766ETPRO TROJAN NanoCore RAT CnC 74970928289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049706282892816766 06/02/23-02:27:24.211225TCP2816766ETPRO TROJAN NanoCore RAT CnC 74970628289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049716282892816766 06/02/23-02:28:25.005929TCP2816766ETPRO TROJAN NanoCore RAT CnC 74971628289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049709282892025019 06/02/23-02:27:41.004326TCP2025019ET TROJAN Possible NanoCore C2 60B4970928289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049704393992806578 06/02/23-02:27:01.218732TCP2806578ETPRO TROJAN DarkComet-RAT server join acknowledgement 24970439399192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049704393992807821 06/02/23-02:28:23.003919TCP2807821ETPRO TROJAN DarkComet-RAT activity4970439399192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049710282892816766 06/02/23-02:27:48.244529TCP2816766ETPRO TROJAN NanoCore RAT CnC 74971028289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049711282892816766 06/02/23-02:27:54.312190TCP2816766ETPRO TROJAN NanoCore RAT CnC 74971128289192.168.2.35.252.165.230
                            5.252.165.230192.168.2.328289497142841753 06/02/23-02:28:11.405336TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)28289497145.252.165.230192.168.2.3
                            192.168.2.35.252.165.23049702282892816766 06/02/23-02:26:46.881522TCP2816766ETPRO TROJAN NanoCore RAT CnC 74970228289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049712282892816766 06/02/23-02:27:59.647498TCP2816766ETPRO TROJAN NanoCore RAT CnC 74971228289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049713282892816766 06/02/23-02:28:06.982149TCP2816766ETPRO TROJAN NanoCore RAT CnC 74971328289192.168.2.35.252.165.230
                            5.252.165.230192.168.2.328289497062810290 06/02/23-02:27:24.236176TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 128289497065.252.165.230192.168.2.3
                            5.252.165.230192.168.2.328289497032841753 06/02/23-02:27:02.943535TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)28289497035.252.165.230192.168.2.3
                            192.168.2.35.252.165.23049714282892816766 06/02/23-02:28:11.424790TCP2816766ETPRO TROJAN NanoCore RAT CnC 74971428289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049715282892816766 06/02/23-02:28:17.957593TCP2816766ETPRO TROJAN NanoCore RAT CnC 74971528289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049703282892816766 06/02/23-02:27:05.840215TCP2816766ETPRO TROJAN NanoCore RAT CnC 74970328289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049705282892816766 06/02/23-02:27:18.414247TCP2816766ETPRO TROJAN NanoCore RAT CnC 74970528289192.168.2.35.252.165.230
                            5.252.165.230192.168.2.328289497122841753 06/02/23-02:27:59.490400TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)28289497125.252.165.230192.168.2.3
                            5.252.165.230192.168.2.328289497102841753 06/02/23-02:27:47.915148TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)28289497105.252.165.230192.168.2.3
                            5.252.165.230192.168.2.328289497112841753 06/02/23-02:27:54.245563TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)28289497115.252.165.230192.168.2.3
                            5.252.165.230192.168.2.328289497062841753 06/02/23-02:27:24.193892TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)28289497065.252.165.230192.168.2.3
                            5.252.165.230192.168.2.328289497072841753 06/02/23-02:27:28.477912TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)28289497075.252.165.230192.168.2.3
                            5.252.165.230192.168.2.328289497082841753 06/02/23-02:27:35.555003TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)28289497085.252.165.230192.168.2.3
                            192.168.2.35.252.165.23049715282892025019 06/02/23-02:28:16.130201TCP2025019ET TROJAN Possible NanoCore C2 60B4971528289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049703282892025019 06/02/23-02:26:52.916534TCP2025019ET TROJAN Possible NanoCore C2 60B4970328289192.168.2.35.252.165.230
                            192.168.2.35.252.165.23049714282892025019 06/02/23-02:28:11.375206TCP2025019ET TROJAN Possible NanoCore C2 60B4971428289192.168.2.35.252.165.230
                            TimestampSource PortDest PortSource IPDest IP
                            Jun 2, 2023 02:26:44.151659012 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.176666975 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.176943064 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.385766983 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.461059093 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.461219072 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.531969070 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.532335043 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.558764935 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.572933912 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.648416996 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.648534060 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.719214916 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.719274998 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.719321966 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.719372988 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.719436884 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.719438076 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.724944115 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.744440079 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.744507074 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.744559050 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.744612932 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.744642973 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.744677067 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.744725943 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.744774103 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.744795084 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.744831085 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.744859934 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.744911909 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.744962931 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.769788980 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.769835949 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.769870043 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.769901991 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.769927025 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.769962072 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.769975901 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.770009041 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.770039082 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.770071030 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.770088911 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.770116091 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.770131111 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.770160913 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.770190954 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.770222902 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.770237923 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.770268917 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.770301104 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.770313978 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.770344019 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.770356894 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.770387888 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.770431042 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.795751095 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.795823097 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.795876980 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.795927048 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.795958042 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.795983076 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.796030998 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.796077967 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.796125889 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.796173096 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.796192884 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.796240091 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.796293020 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.796338081 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.796387911 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.796437979 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.796461105 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.796509027 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.796560049 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.796577930 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.796622992 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.796643972 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.796694040 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.796741962 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.796760082 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.796808004 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.796852112 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.796874046 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.796926022 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.796972036 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.797019005 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.797039032 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.797086000 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.797133923 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.797152996 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.797183037 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.797218084 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.797266006 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.797318935 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.797332048 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.797379017 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.797429085 CEST4970228289192.168.2.35.252.165.230
                            Jun 2, 2023 02:26:44.797446012 CEST28289497025.252.165.230192.168.2.3
                            Jun 2, 2023 02:26:44.797494888 CEST28289497025.252.165.230192.168.2.3
                            TimestampSource PortDest PortSource IPDest IP
                            Jun 2, 2023 02:26:44.097316027 CEST5238753192.168.2.38.8.8.8
                            Jun 2, 2023 02:26:44.140640974 CEST53523878.8.8.8192.168.2.3
                            Jun 2, 2023 02:26:52.799304008 CEST5692453192.168.2.38.8.8.8
                            Jun 2, 2023 02:26:52.834667921 CEST53569248.8.8.8192.168.2.3
                            Jun 2, 2023 02:27:01.122903109 CEST6062553192.168.2.38.8.8.8
                            Jun 2, 2023 02:27:01.157489061 CEST53606258.8.8.8192.168.2.3
                            Jun 2, 2023 02:27:13.448749065 CEST4930253192.168.2.38.8.8.8
                            Jun 2, 2023 02:27:13.469129086 CEST53493028.8.8.8192.168.2.3
                            Jun 2, 2023 02:27:24.085566044 CEST5397553192.168.2.38.8.8.8
                            Jun 2, 2023 02:27:24.114435911 CEST53539758.8.8.8192.168.2.3
                            Jun 2, 2023 02:27:28.394402027 CEST5113953192.168.2.38.8.8.8
                            Jun 2, 2023 02:27:28.415224075 CEST53511398.8.8.8192.168.2.3
                            Jun 2, 2023 02:27:35.480336905 CEST5295553192.168.2.38.8.8.8
                            Jun 2, 2023 02:27:35.500720978 CEST53529558.8.8.8192.168.2.3
                            Jun 2, 2023 02:27:40.942588091 CEST6058253192.168.2.38.8.8.8
                            Jun 2, 2023 02:27:40.977518082 CEST53605828.8.8.8192.168.2.3
                            Jun 2, 2023 02:27:47.830245018 CEST5713453192.168.2.38.8.8.8
                            Jun 2, 2023 02:27:47.858867884 CEST53571348.8.8.8192.168.2.3
                            Jun 2, 2023 02:27:54.156784058 CEST6205053192.168.2.38.8.8.8
                            Jun 2, 2023 02:27:54.177257061 CEST53620508.8.8.8192.168.2.3
                            Jun 2, 2023 02:27:59.039582968 CEST5604253192.168.2.38.8.8.8
                            Jun 2, 2023 02:27:59.075484037 CEST53560428.8.8.8192.168.2.3
                            Jun 2, 2023 02:28:03.900932074 CEST5963653192.168.2.38.8.8.8
                            Jun 2, 2023 02:28:03.929716110 CEST53596368.8.8.8192.168.2.3
                            Jun 2, 2023 02:28:11.316447020 CEST5563853192.168.2.38.8.8.8
                            Jun 2, 2023 02:28:11.342737913 CEST53556388.8.8.8192.168.2.3
                            Jun 2, 2023 02:28:16.073724031 CEST5770453192.168.2.38.8.8.8
                            Jun 2, 2023 02:28:16.102108955 CEST53577048.8.8.8192.168.2.3
                            Jun 2, 2023 02:28:22.290910006 CEST6532053192.168.2.38.8.8.8
                            Jun 2, 2023 02:28:22.325861931 CEST53653208.8.8.8192.168.2.3
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jun 2, 2023 02:26:44.097316027 CEST192.168.2.38.8.8.80xa280Standard query (0)timmy08.ddns.netA (IP address)IN (0x0001)false
                            Jun 2, 2023 02:26:52.799304008 CEST192.168.2.38.8.8.80x2563Standard query (0)timmy08.ddns.netA (IP address)IN (0x0001)false
                            Jun 2, 2023 02:27:01.122903109 CEST192.168.2.38.8.8.80x3b25Standard query (0)timmy08.ddns.netA (IP address)IN (0x0001)false
                            Jun 2, 2023 02:27:13.448749065 CEST192.168.2.38.8.8.80x72f6Standard query (0)timmy08.ddns.netA (IP address)IN (0x0001)false
                            Jun 2, 2023 02:27:24.085566044 CEST192.168.2.38.8.8.80x5786Standard query (0)timmy08.ddns.netA (IP address)IN (0x0001)false
                            Jun 2, 2023 02:27:28.394402027 CEST192.168.2.38.8.8.80x5f2cStandard query (0)timmy08.ddns.netA (IP address)IN (0x0001)false
                            Jun 2, 2023 02:27:35.480336905 CEST192.168.2.38.8.8.80xfe7fStandard query (0)timmy08.ddns.netA (IP address)IN (0x0001)false
                            Jun 2, 2023 02:27:40.942588091 CEST192.168.2.38.8.8.80x25e1Standard query (0)timmy08.ddns.netA (IP address)IN (0x0001)false
                            Jun 2, 2023 02:27:47.830245018 CEST192.168.2.38.8.8.80x554Standard query (0)timmy08.ddns.netA (IP address)IN (0x0001)false
                            Jun 2, 2023 02:27:54.156784058 CEST192.168.2.38.8.8.80x7d9aStandard query (0)timmy08.ddns.netA (IP address)IN (0x0001)false
                            Jun 2, 2023 02:27:59.039582968 CEST192.168.2.38.8.8.80x1fe3Standard query (0)timmy08.ddns.netA (IP address)IN (0x0001)false
                            Jun 2, 2023 02:28:03.900932074 CEST192.168.2.38.8.8.80x9445Standard query (0)timmy08.ddns.netA (IP address)IN (0x0001)false
                            Jun 2, 2023 02:28:11.316447020 CEST192.168.2.38.8.8.80xae54Standard query (0)timmy08.ddns.netA (IP address)IN (0x0001)false
                            Jun 2, 2023 02:28:16.073724031 CEST192.168.2.38.8.8.80x33e2Standard query (0)timmy08.ddns.netA (IP address)IN (0x0001)false
                            Jun 2, 2023 02:28:22.290910006 CEST192.168.2.38.8.8.80xd8eStandard query (0)timmy08.ddns.netA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jun 2, 2023 02:26:44.140640974 CEST8.8.8.8192.168.2.30xa280No error (0)timmy08.ddns.net5.252.165.230A (IP address)IN (0x0001)false
                            Jun 2, 2023 02:26:52.834667921 CEST8.8.8.8192.168.2.30x2563No error (0)timmy08.ddns.net5.252.165.230A (IP address)IN (0x0001)false
                            Jun 2, 2023 02:27:01.157489061 CEST8.8.8.8192.168.2.30x3b25No error (0)timmy08.ddns.net5.252.165.230A (IP address)IN (0x0001)false
                            Jun 2, 2023 02:27:13.469129086 CEST8.8.8.8192.168.2.30x72f6No error (0)timmy08.ddns.net5.252.165.230A (IP address)IN (0x0001)false
                            Jun 2, 2023 02:27:24.114435911 CEST8.8.8.8192.168.2.30x5786No error (0)timmy08.ddns.net5.252.165.230A (IP address)IN (0x0001)false
                            Jun 2, 2023 02:27:28.415224075 CEST8.8.8.8192.168.2.30x5f2cNo error (0)timmy08.ddns.net5.252.165.230A (IP address)IN (0x0001)false
                            Jun 2, 2023 02:27:35.500720978 CEST8.8.8.8192.168.2.30xfe7fNo error (0)timmy08.ddns.net5.252.165.230A (IP address)IN (0x0001)false
                            Jun 2, 2023 02:27:40.977518082 CEST8.8.8.8192.168.2.30x25e1No error (0)timmy08.ddns.net5.252.165.230A (IP address)IN (0x0001)false
                            Jun 2, 2023 02:27:47.858867884 CEST8.8.8.8192.168.2.30x554No error (0)timmy08.ddns.net5.252.165.230A (IP address)IN (0x0001)false
                            Jun 2, 2023 02:27:54.177257061 CEST8.8.8.8192.168.2.30x7d9aNo error (0)timmy08.ddns.net5.252.165.230A (IP address)IN (0x0001)false
                            Jun 2, 2023 02:27:59.075484037 CEST8.8.8.8192.168.2.30x1fe3No error (0)timmy08.ddns.net5.252.165.230A (IP address)IN (0x0001)false
                            Jun 2, 2023 02:28:03.929716110 CEST8.8.8.8192.168.2.30x9445No error (0)timmy08.ddns.net5.252.165.230A (IP address)IN (0x0001)false
                            Jun 2, 2023 02:28:11.342737913 CEST8.8.8.8192.168.2.30xae54No error (0)timmy08.ddns.net5.252.165.230A (IP address)IN (0x0001)false
                            Jun 2, 2023 02:28:16.102108955 CEST8.8.8.8192.168.2.30x33e2No error (0)timmy08.ddns.net5.252.165.230A (IP address)IN (0x0001)false
                            Jun 2, 2023 02:28:22.325861931 CEST8.8.8.8192.168.2.30xd8eNo error (0)timmy08.ddns.net5.252.165.230A (IP address)IN (0x0001)false

                            Click to jump to process

                            Target ID:0
                            Start time:02:26:22
                            Start date:02/06/2023
                            Path:C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
                            Imagebase:0x970000
                            File size:2223104 bytes
                            MD5 hash:A7817732EDED62797B0C5E9DA109EDD7
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: RAT_DarkComet, Description: Detects DarkComet RAT, Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: JoeSecurity_DarkCometRat, Description: Yara detected DarkComet, Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: DarkComet_1, Description: DarkComet RAT, Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, Author: botherder https://github.com/botherder
                            • Rule: DarkComet_3, Description: unknown, Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: DarkComet_4, Description: unknown, Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Darkcomet_1df27bcc, Description: unknown, Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.399195409.0000000004886000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.392562881.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: RAT_DarkComet, Description: Detects DarkComet RAT, Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: JoeSecurity_DarkCometRat, Description: Yara detected DarkComet, Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: DarkComet_1, Description: DarkComet RAT, Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, Author: botherder https://github.com/botherder
                            • Rule: DarkComet_3, Description: unknown, Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: DarkComet_4, Description: unknown, Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Darkcomet_1df27bcc, Description: unknown, Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.399195409.0000000004105000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Reputation:low

                            Target ID:1
                            Start time:02:26:30
                            Start date:02/06/2023
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
                            Imagebase:0xd60000
                            File size:430592 bytes
                            MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Reputation:high

                            Target ID:2
                            Start time:02:26:30
                            Start date:02/06/2023
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff745070000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:3
                            Start time:02:26:31
                            Start date:02/06/2023
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\JXayEzy.exe
                            Imagebase:0xd60000
                            File size:430592 bytes
                            MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Reputation:high

                            Target ID:4
                            Start time:02:26:31
                            Start date:02/06/2023
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmp12D0.tmp
                            Imagebase:0x1f0000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:5
                            Start time:02:26:31
                            Start date:02/06/2023
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff745070000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:6
                            Start time:02:26:31
                            Start date:02/06/2023
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff745070000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:7
                            Start time:02:26:32
                            Start date:02/06/2023
                            Path:C:\Users\user\AppData\Roaming\JXayEzy.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\JXayEzy.exe
                            Imagebase:0x9d0000
                            File size:2223104 bytes
                            MD5 hash:A7817732EDED62797B0C5E9DA109EDD7
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:.Net C# or VB.NET
                            Antivirus matches:
                            • Detection: 100%, Joe Sandbox ML
                            • Detection: 27%, ReversingLabs
                            Reputation:low

                            Target ID:8
                            Start time:02:26:34
                            Start date:02/06/2023
                            Path:C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
                            Imagebase:0x3e0000
                            File size:2223104 bytes
                            MD5 hash:A7817732EDED62797B0C5E9DA109EDD7
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low

                            Target ID:10
                            Start time:02:26:35
                            Start date:02/06/2023
                            Path:C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
                            Imagebase:0x160000
                            File size:2223104 bytes
                            MD5 hash:A7817732EDED62797B0C5E9DA109EDD7
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low

                            Target ID:11
                            Start time:02:26:35
                            Start date:02/06/2023
                            Path:C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
                            Imagebase:0x4c0000
                            File size:2223104 bytes
                            MD5 hash:A7817732EDED62797B0C5E9DA109EDD7
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low

                            Target ID:12
                            Start time:02:26:35
                            Start date:02/06/2023
                            Path:C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe
                            Imagebase:0xce0000
                            File size:2223104 bytes
                            MD5 hash:A7817732EDED62797B0C5E9DA109EDD7
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:Borland Delphi
                            Yara matches:
                            • Rule: DarkComet_2, Description: DarkComet, Source: 0000000C.00000002.400104178.0000000003096000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                            • Rule: Malware_QA_update, Description: VT Research QA uploaded malware - file update.exe, Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: RAT_DarkComet, Description: Detects DarkComet RAT, Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: JoeSecurity_DarkCometRat, Description: Yara detected DarkComet, Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: MALWARE_Win_DarkComet, Description: Detects DarkComet, Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: DarkComet_1, Description: DarkComet RAT, Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: botherder https://github.com/botherder
                            • Rule: DarkComet_3, Description: unknown, Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: DarkComet_4, Description: unknown, Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Darkcomet_1df27bcc, Description: unknown, Source: 0000000C.00000002.397292430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: DarkComet_2, Description: DarkComet, Source: 0000000C.00000002.400104178.000000000306C000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000C.00000002.397292430.000000000049D000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: DarkComet_2, Description: DarkComet, Source: 0000000C.00000002.400104178.00000000030BA000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.397292430.00000000004A4000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.397292430.00000000004A4000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.397292430.00000000004A4000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000C.00000002.397292430.00000000004A4000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: DarkComet_2, Description: DarkComet, Source: 0000000C.00000002.400104178.00000000030C1000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                            Reputation:low

                            Target ID:13
                            Start time:02:26:36
                            Start date:02/06/2023
                            Path:C:\Windows\SysWOW64\cmd.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe" +s +h
                            Imagebase:0xb0000
                            File size:232960 bytes
                            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:14
                            Start time:02:26:37
                            Start date:02/06/2023
                            Path:C:\Windows\SysWOW64\cmd.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop" +s +h
                            Imagebase:0xb0000
                            File size:232960 bytes
                            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:15
                            Start time:02:26:37
                            Start date:02/06/2023
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff745070000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:16
                            Start time:02:26:37
                            Start date:02/06/2023
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff745070000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:17
                            Start time:02:26:38
                            Start date:02/06/2023
                            Path:C:\Windows\SysWOW64\attrib.exe
                            Wow64 process (32bit):true
                            Commandline:attrib "C:\Users\user\Desktop\A1DB2JVWGG.CNT.exe" +s +h
                            Imagebase:0x1220000
                            File size:19456 bytes
                            MD5 hash:A5540E9F87D4CB083BDF8269DEC1CFF9
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:18
                            Start time:02:26:38
                            Start date:02/06/2023
                            Path:C:\Windows\SysWOW64\attrib.exe
                            Wow64 process (32bit):true
                            Commandline:attrib "C:\Users\user\Desktop" +s +h
                            Imagebase:0x1220000
                            File size:19456 bytes
                            MD5 hash:A5540E9F87D4CB083BDF8269DEC1CFF9
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:19
                            Start time:02:26:38
                            Start date:02/06/2023
                            Path:C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE"
                            Imagebase:0xcc0000
                            File size:207360 bytes
                            MD5 hash:4D9AC7D6E684CD3874B662971B6BC536
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.639756642.0000000006C60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.639756642.0000000006C60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000013.00000002.639756642.0000000006C60000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.639756642.0000000006C60000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.640582585.0000000006CE0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.640582585.0000000006CE0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000013.00000002.640582585.0000000006CE0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.640582585.0000000006CE0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.640822750.0000000006D00000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.640822750.0000000006D00000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000013.00000002.640822750.0000000006D00000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.640822750.0000000006D00000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.639572623.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.639572623.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000013.00000002.639572623.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.639572623.0000000006C40000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.639327601.0000000006C10000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.639327601.0000000006C10000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000013.00000002.639327601.0000000006C10000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.639327601.0000000006C10000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.640048341.0000000006C80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.640048341.0000000006C80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000013.00000002.640048341.0000000006C80000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.640048341.0000000006C80000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.625066874.00000000033FB000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000000.391419117.0000000000CC2000.00000002.00000001.01000000.0000000A.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000000.391419117.0000000000CC2000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000013.00000000.391419117.0000000000CC2000.00000002.00000001.01000000.0000000A.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000000.391419117.0000000000CC2000.00000002.00000001.01000000.0000000A.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.640453706.0000000006CD0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.640453706.0000000006CD0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000013.00000002.640453706.0000000006CD0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.640453706.0000000006CD0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.639417055.0000000006C20000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.639417055.0000000006C20000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000013.00000002.639417055.0000000006C20000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.639417055.0000000006C20000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.640195396.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.640195396.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000013.00000002.640195396.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.640195396.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.640312728.0000000006CB0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.640312728.0000000006CB0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000013.00000002.640312728.0000000006CB0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.640312728.0000000006CB0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.640130436.0000000006C90000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.640130436.0000000006C90000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000013.00000002.640130436.0000000006C90000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.640130436.0000000006C90000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.637176007.0000000005D10000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.637176007.0000000005D10000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.637176007.0000000005D10000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000013.00000002.637176007.0000000005D10000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.637176007.0000000005D10000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.631531483.0000000004515000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.641220331.0000000006D30000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.641220331.0000000006D30000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000013.00000002.641220331.0000000006D30000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.641220331.0000000006D30000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.631531483.000000000441F000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.636982367.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.636982367.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000013.00000002.636982367.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.636982367.0000000005A80000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000013.00000002.625066874.00000000033A1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, Author: Florian Roth (Nextron Systems)
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, Author: Joe Security
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, Author: ditekSHen
                            • Rule: NanoCore, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE, Author: unknown
                            Antivirus matches:
                            • Detection: 100%, Avira
                            • Detection: 100%, Joe Sandbox ML

                            Target ID:20
                            Start time:02:26:40
                            Start date:02/06/2023
                            Path:C:\Windows\SysWOW64\notepad.exe
                            Wow64 process (32bit):true
                            Commandline:notepad
                            Imagebase:0xdd0000
                            File size:236032 bytes
                            MD5 hash:D693F13FE3AA2010B854C4C60671B8E2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:21
                            Start time:02:26:41
                            Start date:02/06/2023
                            Path:C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Documents\MSDCSC\msdcsc.exe"
                            Imagebase:0x940000
                            File size:2223104 bytes
                            MD5 hash:A7817732EDED62797B0C5E9DA109EDD7
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000002.470317430.0000000004126000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.470317430.0000000004126000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.470317430.0000000004126000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000015.00000002.470317430.0000000004126000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000015.00000002.442690195.000000000319D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: RAT_DarkComet, Description: Detects DarkComet RAT, Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: JoeSecurity_DarkCometRat, Description: Yara detected DarkComet, Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: DarkComet_1, Description: DarkComet RAT, Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, Author: botherder https://github.com/botherder
                            • Rule: DarkComet_3, Description: unknown, Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: DarkComet_4, Description: unknown, Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Darkcomet_1df27bcc, Description: unknown, Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000015.00000002.470317430.0000000004AAC000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Antivirus matches:
                            • Detection: 100%, Joe Sandbox ML
                            • Detection: 27%, ReversingLabs

                            Target ID:22
                            Start time:02:26:47
                            Start date:02/06/2023
                            Path:C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Documents\MSDCSC\msdcsc.exe"
                            Imagebase:0xd80000
                            File size:2223104 bytes
                            MD5 hash:A7817732EDED62797B0C5E9DA109EDD7
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000016.00000002.475372371.00000000033B7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000016.00000002.486347814.0000000005049000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.486347814.0000000005049000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.486347814.0000000005049000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000016.00000002.486347814.0000000005049000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                            Target ID:23
                            Start time:02:26:49
                            Start date:02/06/2023
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            Imagebase:0xd60000
                            File size:430592 bytes
                            MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET

                            Target ID:24
                            Start time:02:26:49
                            Start date:02/06/2023
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff745070000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:25
                            Start time:02:26:49
                            Start date:02/06/2023
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\JXayEzy.exe
                            Imagebase:0xd60000
                            File size:430592 bytes
                            MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET

                            Target ID:26
                            Start time:02:26:49
                            Start date:02/06/2023
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff745070000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:27
                            Start time:02:26:49
                            Start date:02/06/2023
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmp5A49.tmp
                            Imagebase:0x1f0000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:28
                            Start time:02:26:49
                            Start date:02/06/2023
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff745070000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:31
                            Start time:02:26:55
                            Start date:02/06/2023
                            Path:C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            Imagebase:0x100000
                            File size:2223104 bytes
                            MD5 hash:A7817732EDED62797B0C5E9DA109EDD7
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:32
                            Start time:02:26:55
                            Start date:02/06/2023
                            Path:C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            Imagebase:0x800000
                            File size:2223104 bytes
                            MD5 hash:A7817732EDED62797B0C5E9DA109EDD7
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:Borland Delphi
                            Yara matches:
                            • Rule: DarkComet_2, Description: DarkComet, Source: 00000020.00000002.622990283.0000000002C81000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                            • Rule: DarkComet_2, Description: DarkComet, Source: 00000020.00000002.622990283.0000000002C2C000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                            • Rule: DarkComet_2, Description: DarkComet, Source: 00000020.00000002.622990283.0000000002C7A000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_

                            Target ID:33
                            Start time:02:26:57
                            Start date:02/06/2023
                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                            Imagebase:0x1f0000
                            File size:207360 bytes
                            MD5 hash:4D9AC7D6E684CD3874B662971B6BC536
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000021.00000002.456486839.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000021.00000002.456486839.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000021.00000002.456486839.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000021.00000002.454672045.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000021.00000002.454672045.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000021.00000002.454672045.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth (Nextron Systems)
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth (Nextron Systems)
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Joe Security
                            • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: ditekSHen
                            • Rule: NanoCore, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: unknown
                            Antivirus matches:
                            • Detection: 100%, Avira
                            • Detection: 100%, Joe Sandbox ML

                            Target ID:34
                            Start time:02:26:59
                            Start date:02/06/2023
                            Path:C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\AppData\Local\Temp\JUNE STUB.EXE"
                            Imagebase:0x7f0000
                            File size:207360 bytes
                            MD5 hash:4D9AC7D6E684CD3874B662971B6BC536
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000022.00000002.459239135.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000022.00000002.459239135.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000022.00000002.459239135.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                            Target ID:35
                            Start time:02:26:59
                            Start date:02/06/2023
                            Path:C:\Windows\SysWOW64\notepad.exe
                            Wow64 process (32bit):true
                            Commandline:notepad
                            Imagebase:0xdd0000
                            File size:236032 bytes
                            MD5 hash:D693F13FE3AA2010B854C4C60671B8E2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:36
                            Start time:02:27:06
                            Start date:02/06/2023
                            Path:C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Documents\MSDCSC\msdcsc.exe"
                            Imagebase:0xb60000
                            File size:2223104 bytes
                            MD5 hash:A7817732EDED62797B0C5E9DA109EDD7
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:.Net C# or VB.NET

                            Target ID:37
                            Start time:02:27:07
                            Start date:02/06/2023
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmp9C72.tmp
                            Imagebase:0x1f0000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language

                            Target ID:38
                            Start time:02:27:07
                            Start date:02/06/2023
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff745070000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language

                            Target ID:39
                            Start time:02:27:11
                            Start date:02/06/2023
                            Path:C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            Imagebase:0x900000
                            File size:2223104 bytes
                            MD5 hash:A7817732EDED62797B0C5E9DA109EDD7
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:Borland Delphi
                            Yara matches:
                            • Rule: DarkComet_2, Description: DarkComet, Source: 00000027.00000002.468665185.0000000002E81000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                            • Rule: DarkComet_2, Description: DarkComet, Source: 00000027.00000002.468665185.0000000002E7A000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                            • Rule: DarkComet_2, Description: DarkComet, Source: 00000027.00000002.468665185.0000000002E56000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                            • Rule: DarkComet_2, Description: DarkComet, Source: 00000027.00000002.468665185.0000000002E2C000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_

                            Target ID:40
                            Start time:02:27:26
                            Start date:02/06/2023
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\user\AppData\Local\Temp\tmpE34F.tmp
                            Imagebase:0x1f0000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language

                            Target ID:41
                            Start time:02:27:26
                            Start date:02/06/2023
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff745070000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language

                            Target ID:42
                            Start time:02:27:28
                            Start date:02/06/2023
                            Path:C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            Imagebase:0x100000
                            File size:2223104 bytes
                            MD5 hash:A7817732EDED62797B0C5E9DA109EDD7
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language

                            Target ID:43
                            Start time:02:27:30
                            Start date:02/06/2023
                            Path:C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\Documents\MSDCSC\msdcsc.exe
                            Imagebase:0x640000
                            File size:2223104 bytes
                            MD5 hash:A7817732EDED62797B0C5E9DA109EDD7
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:Borland Delphi
                            Yara matches:
                            • Rule: DarkComet_2, Description: DarkComet, Source: 0000002B.00000002.507022400.0000000002ACA000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                            • Rule: DarkComet_2, Description: DarkComet, Source: 0000002B.00000002.507022400.0000000002AA6000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                            • Rule: DarkComet_2, Description: DarkComet, Source: 0000002B.00000002.507022400.0000000002A7C000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                            • Rule: DarkComet_2, Description: DarkComet, Source: 0000002B.00000002.507022400.0000000002AD1000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_

                            No disassembly