Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
817260722.exe

Overview

General Information

Sample Name:817260722.exe
Analysis ID:673334
MD5:c02f8b6dca006868bb1586ae16677695
SHA1:7af3266b07123e13ff02d937508d99b6bf36f9f2
SHA256:8e4b447ce039f31de8964545b7ccfb839622a7ab6822268ddd8d7646c5166a56
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Yara detected Generic Downloader
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • 817260722.exe (PID: 740 cmdline: "C:\Users\user\Desktop\817260722.exe" MD5: C02F8B6DCA006868BB1586AE16677695)
    • 817260722.exe (PID: 3176 cmdline: C:\Users\user\Desktop\817260722.exe MD5: C02F8B6DCA006868BB1586AE16677695)
      • schtasks.exe (PID: 1388 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpBBF1.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5152 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5940 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpC76B.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 4616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • 817260722.exe (PID: 3452 cmdline: C:\Users\user\Desktop\817260722.exe 0 MD5: C02F8B6DCA006868BB1586AE16677695)
    • 817260722.exe (PID: 4284 cmdline: C:\Users\user\Desktop\817260722.exe MD5: C02F8B6DCA006868BB1586AE16677695)
  • dhcpmon.exe (PID: 392 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: C02F8B6DCA006868BB1586AE16677695)
    • dhcpmon.exe (PID: 1564 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: C02F8B6DCA006868BB1586AE16677695)
  • dhcpmon.exe (PID: 3808 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: C02F8B6DCA006868BB1586AE16677695)
    • dhcpmon.exe (PID: 5060 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: C02F8B6DCA006868BB1586AE16677695)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "99bdd317-26d2-4098-abcb-4bff156f", "Group": "Default", "Domain1": "xp230522.ddns.net", "Domain2": "xp230522.ddns.net", "Port": 1996, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
0000001B.00000000.405977261.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000001B.00000000.405977261.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000001B.00000000.405977261.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000004.00000002.541780857.0000000006110000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    00000004.00000002.541780857.0000000006110000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    Click to see the 156 entries
    SourceRuleDescriptionAuthorStrings
    4.2.817260722.exe.7160000.34.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x350b:$x1: NanoCore.ClientPluginHost
    • 0x3525:$x2: IClientNetworkHost
    4.2.817260722.exe.7160000.34.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x350b:$x2: NanoCore.ClientPluginHost
    • 0x52b6:$s4: PipeCreated
    • 0x34f8:$s5: IClientLoggingHost
    4.2.817260722.exe.7160000.34.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0x34e2:$x2: NanoCore.ClientPlugin
    • 0x350b:$x3: NanoCore.ClientPluginHost
    • 0x34d3:$i3: IClientNetwork
    • 0x34f8:$i6: IClientLoggingHost
    • 0x3525:$i7: IClientNetworkHost
    • 0x334e:$s1: ClientPlugin
    • 0x34eb:$s1: ClientPlugin
    4.2.817260722.exe.3d905e4.8.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xd9ad:$x1: NanoCore.ClientPluginHost
    • 0xd9da:$x2: IClientNetworkHost
    4.2.817260722.exe.3d905e4.8.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xd9ad:$x2: NanoCore.ClientPluginHost
    • 0xea88:$s4: PipeCreated
    • 0xd9c7:$s5: IClientLoggingHost
    Click to see the 467 entries

    AV Detection

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\817260722.exe, ProcessId: 3176, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    E-Banking Fraud

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\817260722.exe, ProcessId: 3176, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Stealing of Sensitive Information

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\817260722.exe, ProcessId: 3176, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Remote Access Functionality

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\817260722.exe, ProcessId: 3176, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
    Timestamp:107.182.129.51192.168.2.41996497792841753 07/26/22-08:55:05.636741
    SID:2841753
    Source Port:1996
    Destination Port:49779
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4107.182.129.514977519962025019 07/26/22-08:54:33.689316
    SID:2025019
    Source Port:49775
    Destination Port:1996
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4107.182.129.514976219962025019 07/26/22-08:53:53.215216
    SID:2025019
    Source Port:49762
    Destination Port:1996
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4107.182.129.514977519962816766 07/26/22-08:54:35.365504
    SID:2816766
    Source Port:49775
    Destination Port:1996
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:107.182.129.51192.168.2.41996497752810290 07/26/22-08:54:35.365326
    SID:2810290
    Source Port:1996
    Destination Port:49775
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4107.182.129.514977319962816766 07/26/22-08:54:16.285458
    SID:2816766
    Source Port:49773
    Destination Port:1996
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4107.182.129.514977119962816766 07/26/22-08:54:04.771142
    SID:2816766
    Source Port:49771
    Destination Port:1996
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4107.182.129.514977919962025019 07/26/22-08:55:00.885923
    SID:2025019
    Source Port:49779
    Destination Port:1996
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4107.182.129.514977319962025019 07/26/22-08:54:13.559623
    SID:2025019
    Source Port:49773
    Destination Port:1996
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4107.182.129.514977819962816766 07/26/22-08:54:53.184638
    SID:2816766
    Source Port:49778
    Destination Port:1996
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:107.182.129.51192.168.2.41996497942841753 07/26/22-08:55:42.370175
    SID:2841753
    Source Port:1996
    Destination Port:49794
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:107.182.129.51192.168.2.41996497792810451 07/26/22-08:55:06.388908
    SID:2810451
    Source Port:1996
    Destination Port:49779
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4107.182.129.514978519962025019 07/26/22-08:55:15.036847
    SID:2025019
    Source Port:49785
    Destination Port:1996
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4107.182.129.514977419962816766 07/26/22-08:54:23.860613
    SID:2816766
    Source Port:49774
    Destination Port:1996
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4107.182.129.514979419962025019 07/26/22-08:55:22.282600
    SID:2025019
    Source Port:49794
    Destination Port:1996
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4107.182.129.514977919962816766 07/26/22-08:55:06.145125
    SID:2816766
    Source Port:49779
    Destination Port:1996
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4107.182.129.514977119962025019 07/26/22-08:54:03.620309
    SID:2025019
    Source Port:49771
    Destination Port:1996
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4107.182.129.514977419962025019 07/26/22-08:54:23.649948
    SID:2025019
    Source Port:49774
    Destination Port:1996
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4107.182.129.514977819962025019 07/26/22-08:54:51.216057
    SID:2025019
    Source Port:49778
    Destination Port:1996
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4107.182.129.514976219962816766 07/26/22-08:53:54.627995
    SID:2816766
    Source Port:49762
    Destination Port:1996
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:107.182.129.51192.168.2.41996497742841753 07/26/22-08:54:28.522053
    SID:2841753
    Source Port:1996
    Destination Port:49774
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.4107.182.129.514978519962816766 07/26/22-08:55:16.155273
    SID:2816766
    Source Port:49785
    Destination Port:1996
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 817260722.exeVirustotal: Detection: 28%Perma Link
    Source: 817260722.exeReversingLabs: Detection: 12%
    Source: xp230522.ddns.netVirustotal: Detection: 13%Perma Link
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 12%
    Source: Yara matchFile source: 4.2.817260722.exe.3d905e4.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.50057f0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c857f0.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.3c44c0d.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.4fd2bd0.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4fa2bd0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.4f98db0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.61a0000.22.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.50057f0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.50057f0.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.434b7ae.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.4fd2bd0.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.3c3b7ae.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.39005e4.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.47e6700.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.4fd2bd0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4f68db0.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c52bd0.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.39005e4.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4fa2bd0.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c18db0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.3904c0d.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.4354c0d.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.49472a0.18.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.3c405e4.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4fd57f0.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.43505e4.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.4f98db0.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.3d905e4.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.4fd2bd0.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.47e6700.13.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4fd57f0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.61a0000.22.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c857f0.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.50057f0.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.38fb7ae.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.61a4629.23.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.43505e4.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c52bd0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.3c405e4.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.47ead29.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.3d8b7ae.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.46e07ba.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.3d94c0d.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.494246a.20.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.47e18ca.14.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.46cc18d.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.49472a0.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.46bff59.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.494b8c9.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000001B.00000000.405977261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.472449366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000000.402793573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.503116649.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000000.401893564.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.541901442.00000000061A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000017.00000002.463307851.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000016.00000002.464025874.0000000004F68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000000.285295019.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000000.407444075.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000000.403577767.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000000.287351105.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000000.410685573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000000.285999073.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000002.479219772.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000002.482709358.00000000038B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000000.407245054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000000.400965015.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.521606839.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.300265588.0000000004C18000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000000.286707443.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000000.405195621.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.450499037.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000002.445781920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000000.402553165.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000002.463553299.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000000.404372234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.529472425.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.489581355.0000000003301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.491136642.0000000004309000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000002.458881687.0000000003BF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000000.399382849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000002.456948482.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: 817260722.exe PID: 740, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: 817260722.exe PID: 3176, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: 817260722.exe PID: 3452, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 392, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3808, type: MEMORYSTR
    Source: 817260722.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
    Source: 27.0.dhcpmon.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 4.0.817260722.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 25.0.817260722.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 26.0.dhcpmon.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 25.0.817260722.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 25.0.817260722.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 27.0.dhcpmon.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 27.0.dhcpmon.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 4.2.817260722.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 25.0.817260722.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 26.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 27.0.dhcpmon.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 4.0.817260722.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 25.2.817260722.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 26.0.dhcpmon.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 4.0.817260722.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 25.0.817260722.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 4.0.817260722.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 27.0.dhcpmon.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 27.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 26.0.dhcpmon.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 4.0.817260722.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 26.0.dhcpmon.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 4.2.817260722.exe.61a0000.22.unpackAvira: Label: TR/NanoCore.fadte
    Source: 26.0.dhcpmon.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 0000001A.00000002.479219772.00000000028B1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "99bdd317-26d2-4098-abcb-4bff156f", "Group": "Default", "Domain1": "xp230522.ddns.net", "Domain2": "xp230522.ddns.net", "Port": 1996, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
    Source: 817260722.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 817260722.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: 817260722.exe, 00000004.00000002.544982839.0000000006FA0000.00000004.08000000.00040000.00000000.sdmp, 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: 817260722.exe, 00000004.00000002.545365006.0000000007100000.00000004.08000000.00040000.00000000.sdmp, 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: 817260722.exe, 00000004.00000002.545636957.0000000007130000.00000004.08000000.00040000.00000000.sdmp, 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.534293388.0000000004857000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.544918423.0000000006F90000.00000004.08000000.00040000.00000000.sdmp, 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.534293388.0000000004857000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.545525564.0000000007120000.00000004.08000000.00040000.00000000.sdmp, 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.545436533.0000000007110000.00000004.08000000.00040000.00000000.sdmp, 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_066DB841
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]4_2_076C2A68
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]4_2_076C2A58

    Networking

    barindex
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49762 -> 107.182.129.51:1996
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49762 -> 107.182.129.51:1996
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49771 -> 107.182.129.51:1996
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49771 -> 107.182.129.51:1996
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49773 -> 107.182.129.51:1996
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49773 -> 107.182.129.51:1996
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49774 -> 107.182.129.51:1996
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49774 -> 107.182.129.51:1996
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 107.182.129.51:1996 -> 192.168.2.4:49774
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49775 -> 107.182.129.51:1996
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49775 -> 107.182.129.51:1996
    Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 107.182.129.51:1996 -> 192.168.2.4:49775
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49778 -> 107.182.129.51:1996
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49778 -> 107.182.129.51:1996
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49779 -> 107.182.129.51:1996
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49779 -> 107.182.129.51:1996
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 107.182.129.51:1996 -> 192.168.2.4:49779
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49785 -> 107.182.129.51:1996
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49785 -> 107.182.129.51:1996
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49794 -> 107.182.129.51:1996
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 107.182.129.51:1996 -> 192.168.2.4:49794
    Source: TrafficSnort IDS: 2810451 ETPRO TROJAN NanoCore RAT Keepalive Response 3 107.182.129.51:1996 -> 192.168.2.4:49779
    Source: Yara matchFile source: 4.2.817260722.exe.47e6700.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.2dd2b24.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.2dc68dc.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.47ead29.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.494246a.20.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.47e18ca.14.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.46cc18d.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.49472a0.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.46bff59.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.494b8c9.19.raw.unpack, type: UNPACKEDPE
    Source: Malware configuration extractorURLs: xp230522.ddns.net
    Source: unknownDNS query: name: xp230522.ddns.net
    Source: Joe Sandbox ViewASN Name: META-ASUS META-ASUS
    Source: global trafficTCP traffic: 192.168.2.4:49762 -> 107.182.129.51:1996
    Source: 817260722.exe, 00000000.00000003.241136748.0000000006016000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.w1
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.534293388.0000000004857000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.545525564.0000000007120000.00000004.08000000.00040000.00000000.sdmp, 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://google.com
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
    Source: 817260722.exe, 00000000.00000003.250760884.0000000006017000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.251039869.0000000006018000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFJ
    Source: 817260722.exe, 00000000.00000003.250760884.0000000006017000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.251039869.0000000006018000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comS
    Source: 817260722.exe, 00000000.00000003.250760884.0000000006017000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.251039869.0000000006018000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomd
    Source: 817260722.exe, 00000000.00000003.250760884.0000000006017000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.251039869.0000000006018000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessed
    Source: 817260722.exe, 00000000.00000003.258130705.000000000601A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.commeta
    Source: 817260722.exe, 00000000.00000003.258130705.000000000601A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.commn
    Source: 817260722.exe, 00000000.00000002.302715868.0000000006010000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.258130705.000000000601A000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.289887408.0000000006010000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comoitu
    Source: 817260722.exe, 00000000.00000003.250760884.0000000006017000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.251039869.0000000006018000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comrsiv
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
    Source: 817260722.exe, 00000000.00000003.243130133.0000000006017000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cR
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242961498.0000000006017000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243040917.0000000006018000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243130133.0000000006017000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
    Source: 817260722.exe, 00000000.00000003.243130133.0000000006017000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnl-p
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
    Source: 817260722.exe, 00000000.00000003.253051505.0000000006040000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/Wwo
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
    Source: 817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/)
    Source: 817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/2
    Source: 817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/;
    Source: 817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/A
    Source: 817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/J
    Source: 817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/S
    Source: 817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/e
    Source: 817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
    Source: 817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/S.
    Source: 817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/n
    Source: 817260722.exe, 00000000.00000003.241925223.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244569703.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242521335.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244046297.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244440753.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242064474.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244486744.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241500552.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242047608.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243744055.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243503277.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.240903831.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242120532.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241145484.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244674252.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243012857.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241899507.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244917504.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241322511.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242241772.000000000602B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
    Source: 817260722.exe, 00000000.00000003.241925223.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244569703.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242521335.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244046297.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244440753.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242064474.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244486744.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241500552.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242047608.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243744055.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243503277.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.240903831.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242120532.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241145484.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244674252.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243012857.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241899507.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244917504.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241322511.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242241772.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242357793.000000000602B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com2
    Source: 817260722.exe, 00000000.00000003.241925223.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244569703.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.240770010.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242521335.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244046297.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244440753.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242064474.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244486744.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241500552.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242047608.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243744055.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243503277.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.240903831.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242120532.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241145484.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244674252.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243012857.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241899507.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244917504.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241322511.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242241772.000000000602B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.coma
    Source: 817260722.exe, 00000000.00000003.241925223.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244569703.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.240770010.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242521335.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244046297.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244440753.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242064474.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244486744.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241500552.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242047608.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243744055.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243503277.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.240903831.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242120532.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241145484.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244674252.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243012857.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241899507.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244917504.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241322511.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242241772.000000000602B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comiv
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
    Source: 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
    Source: unknownDNS traffic detected: queries for: xp230522.ddns.net
    Source: 817260722.exe, 00000000.00000002.291661109.000000000134A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
    Source: 817260722.exe, 00000004.00000002.541901442.00000000061A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: 4.2.817260722.exe.3d905e4.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.50057f0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c857f0.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.3c44c0d.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.4fd2bd0.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4fa2bd0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.4f98db0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.61a0000.22.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.50057f0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.50057f0.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.434b7ae.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.4fd2bd0.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.3c3b7ae.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.39005e4.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.47e6700.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.4fd2bd0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4f68db0.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c52bd0.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.39005e4.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4fa2bd0.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c18db0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.3904c0d.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.4354c0d.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.49472a0.18.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.3c405e4.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4fd57f0.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.43505e4.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.4f98db0.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.3d905e4.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.4fd2bd0.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.47e6700.13.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4fd57f0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.61a0000.22.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c857f0.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.50057f0.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.38fb7ae.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.61a4629.23.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.43505e4.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c52bd0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.3c405e4.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.47ead29.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.3d8b7ae.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.46e07ba.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.3d94c0d.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.494246a.20.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.47e18ca.14.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.46cc18d.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.49472a0.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.46bff59.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.494b8c9.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000001B.00000000.405977261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.472449366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000000.402793573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.503116649.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000000.401893564.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.541901442.00000000061A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000017.00000002.463307851.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000016.00000002.464025874.0000000004F68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000000.285295019.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000000.407444075.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000000.403577767.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000000.287351105.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000000.410685573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000000.285999073.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000002.479219772.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000002.482709358.00000000038B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000000.407245054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000000.400965015.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.521606839.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.300265588.0000000004C18000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000000.286707443.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000000.405195621.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.450499037.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000002.445781920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000000.402553165.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000002.463553299.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000000.404372234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.529472425.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.489581355.0000000003301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.491136642.0000000004309000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000002.458881687.0000000003BF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000000.399382849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000002.456948482.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: 817260722.exe PID: 740, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: 817260722.exe PID: 3176, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: 817260722.exe PID: 3452, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 392, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3808, type: MEMORYSTR

    System Summary

    barindex
    Source: 4.2.817260722.exe.7160000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.7160000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.3d905e4.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.3d905e4.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 23.2.dhcpmon.exe.50057f0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 23.2.dhcpmon.exe.50057f0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 23.2.dhcpmon.exe.50057f0.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.2dd2b24.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.2dd2b24.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.817260722.exe.4c857f0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.817260722.exe.4c857f0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.817260722.exe.4c857f0.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.7130000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.7130000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.7110000.30.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.7110000.30.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 25.2.817260722.exe.3c44c0d.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 25.2.817260722.exe.3c44c0d.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.0.817260722.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.0.817260722.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.0.817260722.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.7130000.32.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.7130000.32.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 23.2.dhcpmon.exe.4fd2bd0.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 23.2.dhcpmon.exe.4fd2bd0.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 23.2.dhcpmon.exe.4fd2bd0.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.46bff59.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.46bff59.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 25.0.817260722.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 25.0.817260722.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 25.0.817260722.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 22.2.dhcpmon.exe.4fa2bd0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 22.2.dhcpmon.exe.4fa2bd0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 22.2.dhcpmon.exe.4fa2bd0.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 23.2.dhcpmon.exe.4f98db0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 23.2.dhcpmon.exe.4f98db0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 23.2.dhcpmon.exe.4f98db0.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 27.2.dhcpmon.exe.3369684.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 27.2.dhcpmon.exe.3369684.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.61a0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.61a0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 26.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 26.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 26.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.46cc18d.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.46cc18d.11.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.7110000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.7110000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.7140000.33.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.7140000.33.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.6fa0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.6fa0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.71b0000.38.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.71b0000.38.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.817260722.exe.50057f0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.817260722.exe.50057f0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.817260722.exe.50057f0.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.6fa0000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.6fa0000.28.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.817260722.exe.50057f0.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.817260722.exe.50057f0.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.817260722.exe.50057f0.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 25.0.817260722.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 25.0.817260722.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 25.0.817260722.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.7140000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.7140000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 27.2.dhcpmon.exe.434b7ae.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 27.2.dhcpmon.exe.434b7ae.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 27.2.dhcpmon.exe.434b7ae.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.7174c9f.36.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.7174c9f.36.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 25.0.817260722.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 25.0.817260722.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 25.0.817260722.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.48bbfa6.17.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.48bbfa6.17.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.48bbfa6.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.48bbfa6.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.817260722.exe.4fd2bd0.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.817260722.exe.4fd2bd0.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.817260722.exe.4fd2bd0.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 25.2.817260722.exe.3c3b7ae.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 25.2.817260722.exe.3c3b7ae.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 25.2.817260722.exe.3c3b7ae.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 26.2.dhcpmon.exe.39005e4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 26.2.dhcpmon.exe.39005e4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.47e6700.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.47e6700.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.47e6700.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.7160000.34.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.7160000.34.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.817260722.exe.4fd2bd0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.817260722.exe.4fd2bd0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.817260722.exe.4fd2bd0.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.7170000.37.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.7170000.37.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 22.2.dhcpmon.exe.4f68db0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 22.2.dhcpmon.exe.4f68db0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 22.2.dhcpmon.exe.4f68db0.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 25.0.817260722.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 25.0.817260722.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 25.0.817260722.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.6110000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.6110000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.7100000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.7100000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.817260722.exe.4c52bd0.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.817260722.exe.4c52bd0.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.817260722.exe.4c52bd0.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.2dd2b24.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.2dd2b24.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.2dd2b24.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 26.2.dhcpmon.exe.39005e4.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 26.2.dhcpmon.exe.39005e4.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 22.2.dhcpmon.exe.4fa2bd0.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 22.2.dhcpmon.exe.4fa2bd0.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 22.2.dhcpmon.exe.4fa2bd0.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.0.817260722.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.0.817260722.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.0.817260722.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 26.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 26.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 26.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.817260722.exe.4c18db0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.817260722.exe.4c18db0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.817260722.exe.4c18db0.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.717e8a4.35.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.717e8a4.35.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 26.2.dhcpmon.exe.3904c0d.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 26.2.dhcpmon.exe.3904c0d.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 27.2.dhcpmon.exe.4354c0d.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 27.2.dhcpmon.exe.4354c0d.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 25.2.817260722.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 25.2.817260722.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 25.2.817260722.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.49472a0.18.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.49472a0.18.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.7120000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.7120000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.66a0000.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.66a0000.25.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 25.2.817260722.exe.3c405e4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 25.2.817260722.exe.3c405e4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.7170000.37.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.7170000.37.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.2de7160.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.2de7160.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.2de7160.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.71b0000.38.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.71b0000.38.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.7120000.31.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.7120000.31.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 22.2.dhcpmon.exe.4fd57f0.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 22.2.dhcpmon.exe.4fd57f0.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 22.2.dhcpmon.exe.4fd57f0.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 26.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 26.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 26.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 27.2.dhcpmon.exe.43505e4.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 27.2.dhcpmon.exe.43505e4.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 25.0.817260722.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 25.0.817260722.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 25.0.817260722.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.48ca3d6.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.48ca3d6.16.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.817260722.exe.4f98db0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 19.2.817260722.exe.4f98db0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 19.2.817260722.exe.4f98db0.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.0.817260722.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.0.817260722.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.0.817260722.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.2d6f130.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.2d6f130.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.3d905e4.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.3d905e4.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.0.817260722.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.0.817260722.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.0.817260722.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.2dc68dc.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.2dc68dc.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.2dc68dc.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 26.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 26.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 26.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 23.2.dhcpmon.exe.4fd2bd0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 23.2.dhcpmon.exe.4fd2bd0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 23.2.dhcpmon.exe.4fd2bd0.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.47e6700.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.47e6700.13.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 22.2.dhcpmon.exe.4fd57f0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 22.2.dhcpmon.exe.4fd57f0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 22.2.dhcpmon.exe.4fd57f0.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.48ca3d6.16.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.48ca3d6.16.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.0.817260722.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.66b0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.66b0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.61a0000.22.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.61a0000.22.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.6f90000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.817260722.exe.4c857f0.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.817260722.exe.4c857f0.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.817260722.exe.4c857f0.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.66a0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.66a0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.0.817260722.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.0.817260722.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.6f90000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 26.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 26.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 26.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.48b3177.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.66b0000.26.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.48b3177.15.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.66b0000.26.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 23.2.dhcpmon.exe.50057f0.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 23.2.dhcpmon.exe.50057f0.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 23.2.dhcpmon.exe.50057f0.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 26.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 26.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 26.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 25.2.817260722.exe.2c59560.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 25.2.817260722.exe.2c59560.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.61a4629.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 26.2.dhcpmon.exe.38fb7ae.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 26.2.dhcpmon.exe.38fb7ae.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 26.2.dhcpmon.exe.38fb7ae.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.61a4629.23.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.2dc68dc.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.2dc68dc.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 26.2.dhcpmon.exe.2919684.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 26.2.dhcpmon.exe.2919684.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 27.2.dhcpmon.exe.43505e4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 27.2.dhcpmon.exe.43505e4.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.817260722.exe.4c52bd0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.817260722.exe.4c52bd0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0.2.817260722.exe.4c52bd0.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 25.2.817260722.exe.3c405e4.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 25.2.817260722.exe.3c405e4.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.47ead29.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.47ead29.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.47ead29.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.3d8b7ae.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.3d8b7ae.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.3d8b7ae.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.46e07ba.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.46e07ba.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.46e07ba.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.48b3177.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.48b3177.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.48b3177.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.3d94c0d.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.3d94c0d.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.494246a.20.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.494246a.20.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.47e18ca.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.817260722.exe.47e18ca.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.47e18ca.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.46cc18d.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.46cc18d.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.49472a0.18.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.49472a0.18.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.46bff59.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.46bff59.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.817260722.exe.494b8c9.19.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 4.2.817260722.exe.494b8c9.19.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000001B.00000000.405977261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000001B.00000000.405977261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000002.541780857.0000000006110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000002.541780857.0000000006110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0000001B.00000002.472449366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000001B.00000002.472449366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000001A.00000000.402793573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000001A.00000000.402793573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000002.503116649.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000002.503116649.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000019.00000000.401893564.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000019.00000000.401893564.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000002.541901442.00000000061A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000002.541901442.00000000061A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000004.00000002.545978829.0000000007160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000002.545978829.0000000007160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000004.00000002.545365006.0000000007100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000002.545365006.0000000007100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000004.00000002.544982839.0000000006FA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000002.544982839.0000000006FA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000017.00000002.463307851.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000017.00000002.463307851.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000016.00000002.464025874.0000000004F68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000016.00000002.464025874.0000000004F68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000002.545636957.0000000007130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000002.545636957.0000000007130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000004.00000000.285295019.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000000.285295019.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000002.542873005.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000002.542873005.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0000001B.00000000.407444075.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000001B.00000000.407444075.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000002.545720029.0000000007140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000002.545720029.0000000007140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0000001A.00000000.403577767.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000001A.00000000.403577767.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000002.544918423.0000000006F90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000002.544918423.0000000006F90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000000.287351105.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000000.287351105.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000002.542974144.00000000066B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000002.542974144.00000000066B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0000001B.00000000.410685573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000001B.00000000.410685573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000000.285999073.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000000.285999073.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000001A.00000002.479219772.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000001A.00000002.482709358.00000000038B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000001A.00000000.407245054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000001A.00000000.407245054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000019.00000000.400965015.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000019.00000000.400965015.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000002.300265588.0000000004C18000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000000.00000002.300265588.0000000004C18000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000000.286707443.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000000.286707443.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000001A.00000000.405195621.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000001A.00000000.405195621.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000002.534293388.0000000004857000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000013.00000002.450499037.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000013.00000002.450499037.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000019.00000002.445781920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000019.00000002.445781920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000002.545436533.0000000007110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000002.545436533.0000000007110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000019.00000000.402553165.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000019.00000000.402553165.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000001A.00000002.463553299.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000001A.00000002.463553299.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000001B.00000000.404372234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000001B.00000000.404372234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000002.546062697.0000000007170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000002.546062697.0000000007170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000004.00000002.529472425.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000001B.00000002.489581355.0000000003301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000002.545525564.0000000007120000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000002.545525564.0000000007120000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 0000001B.00000002.491136642.0000000004309000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000019.00000002.458881687.0000000003BF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000002.546431970.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000002.546431970.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000019.00000000.399382849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000019.00000000.399382849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000019.00000002.456948482.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: 817260722.exe PID: 740, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: 817260722.exe PID: 740, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: 817260722.exe PID: 3176, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: 817260722.exe PID: 3176, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: 817260722.exe PID: 3452, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: 817260722.exe PID: 3452, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: dhcpmon.exe PID: 392, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: dhcpmon.exe PID: 392, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: dhcpmon.exe PID: 3808, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: dhcpmon.exe PID: 3808, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 817260722.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 4.2.817260722.exe.7160000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7160000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7160000.34.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.3d905e4.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.3d905e4.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.3d905e4.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 23.2.dhcpmon.exe.50057f0.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 23.2.dhcpmon.exe.50057f0.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 23.2.dhcpmon.exe.50057f0.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 23.2.dhcpmon.exe.50057f0.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.2dd2b24.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.2dd2b24.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.2dd2b24.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.817260722.exe.4c857f0.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.817260722.exe.4c857f0.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.817260722.exe.4c857f0.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.817260722.exe.4c857f0.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.7130000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7130000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7130000.32.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.7110000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7110000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7110000.30.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 25.2.817260722.exe.3c44c0d.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.2.817260722.exe.3c44c0d.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.2.817260722.exe.3c44c0d.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.0.817260722.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.0.817260722.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.0.817260722.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.0.817260722.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.7130000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7130000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7130000.32.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 23.2.dhcpmon.exe.4fd2bd0.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 23.2.dhcpmon.exe.4fd2bd0.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 23.2.dhcpmon.exe.4fd2bd0.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 23.2.dhcpmon.exe.4fd2bd0.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.46bff59.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.46bff59.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.46bff59.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 25.0.817260722.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.0.817260722.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.0.817260722.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 25.0.817260722.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 22.2.dhcpmon.exe.4fa2bd0.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 22.2.dhcpmon.exe.4fa2bd0.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 22.2.dhcpmon.exe.4fa2bd0.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 23.2.dhcpmon.exe.4f98db0.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 23.2.dhcpmon.exe.4f98db0.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 23.2.dhcpmon.exe.4f98db0.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 27.2.dhcpmon.exe.3369684.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.2.dhcpmon.exe.3369684.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.2.dhcpmon.exe.3369684.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.61a0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.61a0000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.61a0000.22.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 26.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 26.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.46cc18d.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.46cc18d.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.46cc18d.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.7110000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7110000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7110000.30.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.7140000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7140000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7140000.33.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.6fa0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.6fa0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.6fa0000.28.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.71b0000.38.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.71b0000.38.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.71b0000.38.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.817260722.exe.50057f0.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.817260722.exe.50057f0.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.817260722.exe.50057f0.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.817260722.exe.50057f0.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.6fa0000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.6fa0000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.6fa0000.28.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.817260722.exe.50057f0.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.817260722.exe.50057f0.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.817260722.exe.50057f0.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.817260722.exe.50057f0.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 25.0.817260722.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.0.817260722.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.0.817260722.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 25.0.817260722.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.7140000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7140000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7140000.33.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 27.2.dhcpmon.exe.434b7ae.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.2.dhcpmon.exe.434b7ae.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.2.dhcpmon.exe.434b7ae.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 27.2.dhcpmon.exe.434b7ae.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.7174c9f.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7174c9f.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7174c9f.36.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 25.0.817260722.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.0.817260722.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.0.817260722.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 25.0.817260722.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.48bbfa6.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.48bbfa6.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.48bbfa6.17.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.48bbfa6.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.48bbfa6.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.48bbfa6.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.817260722.exe.4fd2bd0.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.817260722.exe.4fd2bd0.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.817260722.exe.4fd2bd0.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.817260722.exe.4fd2bd0.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 25.2.817260722.exe.3c3b7ae.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.2.817260722.exe.3c3b7ae.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.2.817260722.exe.3c3b7ae.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 25.2.817260722.exe.3c3b7ae.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 26.2.dhcpmon.exe.39005e4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.2.dhcpmon.exe.39005e4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.2.dhcpmon.exe.39005e4.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.47e6700.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.47e6700.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.47e6700.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.47e6700.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.7160000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7160000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7160000.34.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.817260722.exe.4fd2bd0.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.817260722.exe.4fd2bd0.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.817260722.exe.4fd2bd0.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.7170000.37.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7170000.37.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7170000.37.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 22.2.dhcpmon.exe.4f68db0.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 22.2.dhcpmon.exe.4f68db0.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 22.2.dhcpmon.exe.4f68db0.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 25.0.817260722.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.0.817260722.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.0.817260722.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 25.0.817260722.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.6110000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.6110000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.6110000.21.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.7100000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7100000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7100000.29.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.817260722.exe.4c52bd0.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.817260722.exe.4c52bd0.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.817260722.exe.4c52bd0.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.817260722.exe.4c52bd0.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.2dd2b24.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.2dd2b24.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.2dd2b24.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 26.2.dhcpmon.exe.39005e4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.2.dhcpmon.exe.39005e4.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.2.dhcpmon.exe.39005e4.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 22.2.dhcpmon.exe.4fa2bd0.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 22.2.dhcpmon.exe.4fa2bd0.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 22.2.dhcpmon.exe.4fa2bd0.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 22.2.dhcpmon.exe.4fa2bd0.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.0.817260722.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.0.817260722.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.0.817260722.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.0.817260722.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 26.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 26.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.817260722.exe.4c18db0.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.817260722.exe.4c18db0.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.817260722.exe.4c18db0.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.717e8a4.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.717e8a4.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.717e8a4.35.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 26.2.dhcpmon.exe.3904c0d.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.2.dhcpmon.exe.3904c0d.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.2.dhcpmon.exe.3904c0d.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 27.2.dhcpmon.exe.4354c0d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.2.dhcpmon.exe.4354c0d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.2.dhcpmon.exe.4354c0d.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 25.2.817260722.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.2.817260722.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.2.817260722.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 25.2.817260722.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.49472a0.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.49472a0.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.49472a0.18.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.7120000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7120000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7120000.31.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.66a0000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.66a0000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.66a0000.25.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 25.2.817260722.exe.3c405e4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.2.817260722.exe.3c405e4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.2.817260722.exe.3c405e4.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.7170000.37.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7170000.37.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7170000.37.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.2de7160.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.2de7160.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.2de7160.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.2de7160.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.71b0000.38.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.71b0000.38.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.71b0000.38.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.7120000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7120000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.7120000.31.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 22.2.dhcpmon.exe.4fd57f0.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 22.2.dhcpmon.exe.4fd57f0.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 22.2.dhcpmon.exe.4fd57f0.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 22.2.dhcpmon.exe.4fd57f0.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 26.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 26.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 27.2.dhcpmon.exe.43505e4.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.2.dhcpmon.exe.43505e4.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.2.dhcpmon.exe.43505e4.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 25.0.817260722.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.0.817260722.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.0.817260722.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 25.0.817260722.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.48ca3d6.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.48ca3d6.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.48ca3d6.16.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.817260722.exe.4f98db0.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 19.2.817260722.exe.4f98db0.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 19.2.817260722.exe.4f98db0.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.0.817260722.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.0.817260722.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.0.817260722.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.0.817260722.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.2d6f130.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.2d6f130.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.2d6f130.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.3d905e4.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.3d905e4.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.3d905e4.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.0.817260722.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.0.817260722.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.0.817260722.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.0.817260722.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.2dc68dc.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.2dc68dc.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.2dc68dc.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 26.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 26.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 23.2.dhcpmon.exe.4fd2bd0.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 23.2.dhcpmon.exe.4fd2bd0.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 23.2.dhcpmon.exe.4fd2bd0.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.47e6700.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.47e6700.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.47e6700.13.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 22.2.dhcpmon.exe.4fd57f0.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 22.2.dhcpmon.exe.4fd57f0.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 22.2.dhcpmon.exe.4fd57f0.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 22.2.dhcpmon.exe.4fd57f0.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.48ca3d6.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.48ca3d6.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.48ca3d6.16.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.0.817260722.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.0.817260722.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.66b0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.66b0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.66b0000.26.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.61a0000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.61a0000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.61a0000.22.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.6f90000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.6f90000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.817260722.exe.4c857f0.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.817260722.exe.4c857f0.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.817260722.exe.4c857f0.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.817260722.exe.4c857f0.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.66a0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.66a0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.66a0000.25.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.0.817260722.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.0.817260722.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.6f90000.27.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 26.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 26.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.48b3177.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.48b3177.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.66b0000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.66b0000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.48b3177.15.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.66b0000.26.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 23.2.dhcpmon.exe.50057f0.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 23.2.dhcpmon.exe.50057f0.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 23.2.dhcpmon.exe.50057f0.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 23.2.dhcpmon.exe.50057f0.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 26.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 26.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 25.2.817260722.exe.2c59560.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.2.817260722.exe.2c59560.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.2.817260722.exe.2c59560.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.61a4629.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.61a4629.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.2.dhcpmon.exe.38fb7ae.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.2.dhcpmon.exe.38fb7ae.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.2.dhcpmon.exe.38fb7ae.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 26.2.dhcpmon.exe.38fb7ae.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.61a4629.23.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.2dc68dc.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.2dc68dc.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.2dc68dc.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 26.2.dhcpmon.exe.2919684.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.2.dhcpmon.exe.2919684.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 26.2.dhcpmon.exe.2919684.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 27.2.dhcpmon.exe.43505e4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.2.dhcpmon.exe.43505e4.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 27.2.dhcpmon.exe.43505e4.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.817260722.exe.4c52bd0.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0.2.817260722.exe.4c52bd0.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0.2.817260722.exe.4c52bd0.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 25.2.817260722.exe.3c405e4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.2.817260722.exe.3c405e4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 25.2.817260722.exe.3c405e4.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.47ead29.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.47ead29.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.47ead29.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.47ead29.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.3d8b7ae.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.3d8b7ae.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.3d8b7ae.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.3d8b7ae.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.46e07ba.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.46e07ba.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.46e07ba.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.48b3177.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.48b3177.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.48b3177.15.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.48b3177.15.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.3d94c0d.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.3d94c0d.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.3d94c0d.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.494246a.20.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.494246a.20.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.47e18ca.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.47e18ca.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 4.2.817260722.exe.47e18ca.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.47e18ca.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.46cc18d.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.46cc18d.11.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.49472a0.18.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.49472a0.18.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.46bff59.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.46bff59.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.817260722.exe.494b8c9.19.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 4.2.817260722.exe.494b8c9.19.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000001B.00000000.405977261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000001B.00000000.405977261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000002.541780857.0000000006110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.541780857.0000000006110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.541780857.0000000006110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0000001B.00000002.472449366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000001B.00000002.472449366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000001A.00000000.402793573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000001A.00000000.402793573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000002.503116649.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.503116649.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000019.00000000.401893564.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000019.00000000.401893564.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000002.541901442.00000000061A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.541901442.00000000061A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.541901442.00000000061A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000004.00000002.545978829.0000000007160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.545978829.0000000007160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.545978829.0000000007160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000004.00000002.545365006.0000000007100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.545365006.0000000007100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.545365006.0000000007100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000004.00000002.544982839.0000000006FA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.544982839.0000000006FA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.544982839.0000000006FA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000017.00000002.463307851.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000017.00000002.463307851.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000016.00000002.464025874.0000000004F68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000016.00000002.464025874.0000000004F68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000002.545636957.0000000007130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.545636957.0000000007130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.545636957.0000000007130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000004.00000000.285295019.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000000.285295019.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000002.542873005.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.542873005.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.542873005.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0000001B.00000000.407444075.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000001B.00000000.407444075.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000002.545720029.0000000007140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.545720029.0000000007140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.545720029.0000000007140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0000001A.00000000.403577767.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000001A.00000000.403577767.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000002.544918423.0000000006F90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.544918423.0000000006F90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.544918423.0000000006F90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000000.287351105.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000000.287351105.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000002.542974144.00000000066B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.542974144.00000000066B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.542974144.00000000066B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0000001B.00000000.410685573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000001B.00000000.410685573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000000.285999073.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000000.285999073.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000001A.00000002.479219772.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000001A.00000002.482709358.00000000038B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000001A.00000000.407245054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000001A.00000000.407245054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000019.00000000.400965015.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000019.00000000.400965015.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000002.300265588.0000000004C18000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000000.00000002.300265588.0000000004C18000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000000.286707443.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000000.286707443.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000001A.00000000.405195621.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000001A.00000000.405195621.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000002.534293388.0000000004857000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000013.00000002.450499037.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000013.00000002.450499037.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000019.00000002.445781920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000019.00000002.445781920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000002.545436533.0000000007110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.545436533.0000000007110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.545436533.0000000007110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000019.00000000.402553165.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000019.00000000.402553165.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000001A.00000002.463553299.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000001A.00000002.463553299.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000001B.00000000.404372234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000001B.00000000.404372234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000002.546062697.0000000007170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.546062697.0000000007170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.546062697.0000000007170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000004.00000002.529472425.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000001B.00000002.489581355.0000000003301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000002.545525564.0000000007120000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.545525564.0000000007120000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.545525564.0000000007120000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 0000001B.00000002.491136642.0000000004309000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000019.00000002.458881687.0000000003BF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000002.546431970.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.546431970.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000004.00000002.546431970.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000019.00000000.399382849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000019.00000000.399382849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000019.00000002.456948482.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: 817260722.exe PID: 740, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: 817260722.exe PID: 740, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: 817260722.exe PID: 3176, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: 817260722.exe PID: 3176, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: 817260722.exe PID: 3452, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: 817260722.exe PID: 3452, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: dhcpmon.exe PID: 392, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: dhcpmon.exe PID: 392, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: dhcpmon.exe PID: 3808, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: dhcpmon.exe PID: 3808, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: C:\Users\user\Desktop\817260722.exeCode function: 0_2_0184C5D40_2_0184C5D4
    Source: C:\Users\user\Desktop\817260722.exeCode function: 0_2_0184EA080_2_0184EA08
    Source: C:\Users\user\Desktop\817260722.exeCode function: 0_2_0184EA180_2_0184EA18
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_0115E4714_2_0115E471
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_0115E4804_2_0115E480
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_0115BBD44_2_0115BBD4
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_066D82384_2_066D8238
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_066D93BB4_2_066D93BB
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_066D00404_2_066D0040
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_066D8E384_2_066D8E38
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_066D947E4_2_066D947E
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_076C0F084_2_076C0F08
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_076CBF804_2_076CBF80
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_076C4C884_2_076C4C88
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_076C12484_2_076C1248
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_076C02F04_2_076C02F0
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_076C40704_2_076C4070
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_076CC8504_2_076CC850
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_076C0FC64_2_076C0FC6
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_076C4FC04_2_076C4FC0
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_076C4D464_2_076C4D46
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_076CBC384_2_076CBC38
    Source: 817260722.exe, 00000000.00000002.305045348.000000000B790000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSchedulingClerk.dll. vs 817260722.exe
    Source: 817260722.exe, 00000000.00000002.296430700.0000000004829000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSchedulingClerk.dll. vs 817260722.exe
    Source: 817260722.exe, 00000000.00000000.235578751.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameOidGr.exe2 vs 817260722.exe
    Source: 817260722.exe, 00000000.00000002.291661109.000000000134A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 817260722.exe
    Source: 817260722.exe, 00000000.00000002.305024595.000000000B5C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFroor.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000000.00000002.293624545.0000000003021000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFroor.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.541780857.0000000006110000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000000.287602796.00000000008A0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameOidGr.exe2 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.541901442.00000000061A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.541901442.00000000061A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.545978829.0000000007160000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.545365006.0000000007100000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.544982839.0000000006FA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.545636957.0000000007130000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.542873005.00000000066A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.545720029.0000000007140000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.544918423.0000000006F90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.542974144.00000000066B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.521606839.0000000002D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.534293388.0000000004857000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.534293388.0000000004857000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.534293388.0000000004857000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.534293388.0000000004857000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.534293388.0000000004857000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.534293388.0000000004857000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.534293388.0000000004857000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.534293388.0000000004857000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.545436533.0000000007110000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.529472425.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.529472425.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.529472425.0000000003D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.546062697.0000000007170000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.546062697.0000000007170000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.546062697.0000000007170000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.545525564.0000000007120000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.546431970.00000000071B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.542556095.0000000006410000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000013.00000002.461989966.000000000AFC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFroor.dll4 vs 817260722.exe
    Source: 817260722.exe, 00000013.00000002.406508000.0000000000F80000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameOidGr.exe2 vs 817260722.exe
    Source: 817260722.exe, 00000013.00000002.462076148.000000000B190000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSchedulingClerk.dll. vs 817260722.exe
    Source: 817260722.exe, 00000013.00000002.427766611.0000000004BA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSchedulingClerk.dll. vs 817260722.exe
    Source: 817260722.exe, 00000013.00000002.414081362.00000000033A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFroor.dll4 vs 817260722.exe
    Source: 817260722.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: dhcpmon.exe.4.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: 817260722.exeVirustotal: Detection: 28%
    Source: 817260722.exeReversingLabs: Detection: 12%
    Source: C:\Users\user\Desktop\817260722.exeFile read: C:\Users\user\Desktop\817260722.exeJump to behavior
    Source: 817260722.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\817260722.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\817260722.exe "C:\Users\user\Desktop\817260722.exe"
    Source: C:\Users\user\Desktop\817260722.exeProcess created: C:\Users\user\Desktop\817260722.exe C:\Users\user\Desktop\817260722.exe
    Source: C:\Users\user\Desktop\817260722.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpBBF1.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\817260722.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpC76B.tmp
    Source: unknownProcess created: C:\Users\user\Desktop\817260722.exe C:\Users\user\Desktop\817260722.exe 0
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
    Source: C:\Users\user\Desktop\817260722.exeProcess created: C:\Users\user\Desktop\817260722.exe C:\Users\user\Desktop\817260722.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\817260722.exeProcess created: C:\Users\user\Desktop\817260722.exe C:\Users\user\Desktop\817260722.exeJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpBBF1.tmpJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpC76B.tmpJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess created: C:\Users\user\Desktop\817260722.exe C:\Users\user\Desktop\817260722.exeJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
    Source: C:\Users\user\Desktop\817260722.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\817260722.exe.logJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeFile created: C:\Users\user\AppData\Local\Temp\tmpBBF1.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.evad.winEXE@18/11@9/1
    Source: 4.0.817260722.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 4.0.817260722.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 4.2.817260722.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 4.2.817260722.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 4.0.817260722.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 4.0.817260722.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 4.0.817260722.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 4.0.817260722.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 817260722.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    Source: C:\Users\user\Desktop\817260722.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5152:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4616:120:WilError_01
    Source: C:\Users\user\Desktop\817260722.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{99bdd317-26d2-4098-abcb-4bff156f262b}
    Source: C:\Users\user\Desktop\817260722.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
    Source: 817260722.exe, mainPorject/mainWorkForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 0.0.817260722.exe.cb0000.0.unpack, mainPorject/mainWorkForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 0.2.817260722.exe.cb0000.0.unpack, mainPorject/mainWorkForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: dhcpmon.exe.4.dr, mainPorject/mainWorkForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 4.0.817260722.exe.400000.10.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 4.0.817260722.exe.400000.10.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 4.0.817260722.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\Desktop\817260722.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: 817260722.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: 817260722.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: 817260722.exe, 00000004.00000002.544982839.0000000006FA0000.00000004.08000000.00040000.00000000.sdmp, 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: 817260722.exe, 00000004.00000002.545365006.0000000007100000.00000004.08000000.00040000.00000000.sdmp, 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: 817260722.exe, 00000004.00000002.545636957.0000000007130000.00000004.08000000.00040000.00000000.sdmp, 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.534293388.0000000004857000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.544918423.0000000006F90000.00000004.08000000.00040000.00000000.sdmp, 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.534293388.0000000004857000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.545525564.0000000007120000.00000004.08000000.00040000.00000000.sdmp, 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.545436533.0000000007110000.00000004.08000000.00040000.00000000.sdmp, 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmp

    Data Obfuscation

    barindex
    Source: 4.0.817260722.exe.400000.10.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 4.0.817260722.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 4.2.817260722.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 4.2.817260722.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 4.0.817260722.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 4.0.817260722.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 4.0.817260722.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 4.0.817260722.exe.400000.12.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: C:\Users\user\Desktop\817260722.exeCode function: 0_2_0184D690 pushad ; ret 0_2_0184D691
    Source: C:\Users\user\Desktop\817260722.exeCode function: 0_2_01847F5B pushad ; retf 0_2_01847F65
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_066D6708 push esp; iretd 4_2_066D6711
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_066DC78A push 8B000005h; retf 4_2_066DC78F
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_066D4FEC push es; ret 4_2_066D4FF0
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_076CEFB0 pushad ; ret 4_2_076CEFB1
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_076C2E70 push es; ret 4_2_076C2E80
    Source: initial sampleStatic PE information: section name: .text entropy: 7.8696025520130615
    Source: initial sampleStatic PE information: section name: .text entropy: 7.8696025520130615
    Source: 4.0.817260722.exe.400000.10.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 4.0.817260722.exe.400000.10.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 4.2.817260722.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 4.2.817260722.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 4.0.817260722.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 4.0.817260722.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 4.0.817260722.exe.400000.12.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 4.0.817260722.exe.400000.12.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: C:\Users\user\Desktop\817260722.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Users\user\Desktop\817260722.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpBBF1.tmp

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Users\user\Desktop\817260722.exeFile opened: C:\Users\user\Desktop\817260722.exe:Zone.Identifier read attributes | deleteJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\817260722.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: Yara matchFile source: 00000013.00000002.424779681.0000000003646000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000017.00000002.451095329.0000000003646000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000016.00000002.451144180.0000000003616000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.295842230.00000000032C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: 817260722.exe PID: 740, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: 817260722.exe PID: 3452, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 392, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3808, type: MEMORYSTR
    Source: 817260722.exe, 00000000.00000002.295842230.00000000032C8000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000013.00000002.424779681.0000000003646000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000016.00000002.451144180.0000000003616000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000017.00000002.451095329.0000000003646000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
    Source: 817260722.exe, 00000000.00000002.295842230.00000000032C8000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000013.00000002.424779681.0000000003646000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000016.00000002.451144180.0000000003616000.00000004.00000800.00020000.00000000.sdmp, dhcpmon.exe, 00000017.00000002.451095329.0000000003646000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
    Source: C:\Users\user\Desktop\817260722.exe TID: 796Thread sleep time: -45877s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\817260722.exe TID: 4288Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\817260722.exe TID: 1460Thread sleep time: -9223372036854770s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\817260722.exe TID: 3388Thread sleep time: -45877s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\817260722.exe TID: 6128Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5152Thread sleep time: -45877s >= -30000sJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5684Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1300Thread sleep time: -45877s >= -30000sJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1232Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\817260722.exe TID: 5108Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2912Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 60Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\817260722.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\817260722.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\817260722.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\817260722.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\817260722.exeWindow / User API: threadDelayed 9546Jump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeThread delayed: delay time: 45877Jump to behavior
    Source: C:\Users\user\Desktop\817260722.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\817260722.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\817260722.exeThread delayed: delay time: 45877Jump to behavior
    Source: C:\Users\user\Desktop\817260722.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 45877Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 45877Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\817260722.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: dhcpmon.exe, 00000017.00000002.451095329.0000000003646000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
    Source: dhcpmon.exe, 00000017.00000002.451095329.0000000003646000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
    Source: dhcpmon.exe, 00000017.00000002.451095329.0000000003646000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
    Source: dhcpmon.exe, 00000017.00000002.451095329.0000000003646000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
    Source: C:\Users\user\Desktop\817260722.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeMemory allocated: page read and write | page guardJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess created: C:\Users\user\Desktop\817260722.exe C:\Users\user\Desktop\817260722.exeJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpBBF1.tmpJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpC76B.tmpJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeProcess created: C:\Users\user\Desktop\817260722.exe C:\Users\user\Desktop\817260722.exeJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
    Source: 817260722.exe, 00000004.00000002.547597045.000000000848B000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram ManagerX
    Source: 817260722.exe, 00000004.00000002.525806381.0000000002FF2000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.525938168.0000000003002000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.523510735.0000000002E7C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerD$
    Source: 817260722.exe, 00000004.00000002.544825124.0000000006F6E000.00000004.00000010.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.546693778.000000000757B000.00000004.00000010.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.547127362.000000000792B000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager
    Source: 817260722.exe, 00000004.00000002.542637460.000000000655A000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager0
    Source: 817260722.exe, 00000004.00000002.541747415.000000000609D000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager,
    Source: 817260722.exe, 00000004.00000002.548116038.0000000008DCD000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager 8
    Source: 817260722.exe, 00000004.00000002.524242572.0000000002EF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerx
    Source: 817260722.exe, 00000004.00000002.548014250.0000000008ACD000.00000004.00000010.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.545172865.00000000070EE000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Managerram Manager
    Source: 817260722.exe, 00000004.00000002.547392215.000000000800B000.00000004.00000010.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.546592563.000000000743B000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: 817260722.exe, 00000004.00000002.528817593.00000000031DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerx\b
    Source: 817260722.exe, 00000004.00000002.544763719.0000000006E2E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager x
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Users\user\Desktop\817260722.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Users\user\Desktop\817260722.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Users\user\Desktop\817260722.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Users\user\Desktop\817260722.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\817260722.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: C:\Users\user\Desktop\817260722.exeCode function: 4_2_076C1AF0 GetSystemTimes,4_2_076C1AF0
    Source: C:\Users\user\Desktop\817260722.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\817260722.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\817260722.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\817260722.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\817260722.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\817260722.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\817260722.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\817260722.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\817260722.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 4.2.817260722.exe.3d905e4.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.50057f0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c857f0.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.3c44c0d.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.4fd2bd0.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4fa2bd0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.4f98db0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.61a0000.22.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.50057f0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.50057f0.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.434b7ae.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.4fd2bd0.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.3c3b7ae.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.39005e4.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.47e6700.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.4fd2bd0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4f68db0.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c52bd0.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.39005e4.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4fa2bd0.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c18db0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.3904c0d.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.4354c0d.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.49472a0.18.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.3c405e4.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4fd57f0.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.43505e4.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.4f98db0.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.3d905e4.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.4fd2bd0.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.47e6700.13.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4fd57f0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.61a0000.22.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c857f0.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.50057f0.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.38fb7ae.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.61a4629.23.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.43505e4.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c52bd0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.3c405e4.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.47ead29.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.3d8b7ae.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.46e07ba.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.3d94c0d.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.494246a.20.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.47e18ca.14.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.46cc18d.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.49472a0.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.46bff59.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.494b8c9.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000001B.00000000.405977261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.472449366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000000.402793573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.503116649.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000000.401893564.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.541901442.00000000061A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000017.00000002.463307851.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000016.00000002.464025874.0000000004F68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000000.285295019.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000000.407444075.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000000.403577767.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000000.287351105.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000000.410685573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000000.285999073.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000002.479219772.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000002.482709358.00000000038B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000000.407245054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000000.400965015.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.521606839.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.300265588.0000000004C18000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000000.286707443.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000000.405195621.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.450499037.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000002.445781920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000000.402553165.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000002.463553299.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000000.404372234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.529472425.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.489581355.0000000003301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.491136642.0000000004309000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000002.458881687.0000000003BF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000000.399382849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000002.456948482.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: 817260722.exe PID: 740, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: 817260722.exe PID: 3176, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: 817260722.exe PID: 3452, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 392, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3808, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: 817260722.exe, 00000000.00000002.300265588.0000000004C18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.541780857.0000000006110000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.541780857.0000000006110000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: 817260722.exe, 00000004.00000002.503116649.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.541901442.00000000061A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.545978829.0000000007160000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.545365006.0000000007100000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.545365006.0000000007100000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: 817260722.exe, 00000004.00000002.544982839.0000000006FA0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.545636957.0000000007130000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.545636957.0000000007130000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: 817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: 817260722.exe, 00000004.00000002.542873005.00000000066A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.545720029.0000000007140000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.544918423.0000000006F90000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.544918423.0000000006F90000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: 817260722.exe, 00000004.00000002.542974144.00000000066B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.521606839.0000000002D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.521606839.0000000002D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: 817260722.exe, 00000004.00000002.534293388.0000000004857000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.534293388.0000000004857000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: 817260722.exe, 00000004.00000002.545436533.0000000007110000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.545436533.0000000007110000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: 817260722.exe, 00000004.00000002.529472425.0000000003D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.529472425.0000000003D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: 817260722.exe, 00000004.00000002.546062697.0000000007170000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.545525564.0000000007120000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.546431970.00000000071B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: 817260722.exe, 00000013.00000002.450499037.0000000004F98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 00000016.00000002.464025874.0000000004F68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 00000017.00000002.463307851.0000000004F98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Yara matchFile source: 4.2.817260722.exe.3d905e4.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.50057f0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c857f0.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.3c44c0d.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.4fd2bd0.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4fa2bd0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.4f98db0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.61a0000.22.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.50057f0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.50057f0.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.434b7ae.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.4fd2bd0.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.3c3b7ae.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.39005e4.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.47e6700.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.4fd2bd0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4f68db0.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c52bd0.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.39005e4.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4fa2bd0.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c18db0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.3904c0d.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.4354c0d.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.49472a0.18.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.3c405e4.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4fd57f0.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.43505e4.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.0.817260722.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 19.2.817260722.exe.4f98db0.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.3d905e4.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.12.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.4fd2bd0.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.47e6700.13.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 22.2.dhcpmon.exe.4fd57f0.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.61a0000.22.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c857f0.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.0.817260722.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 23.2.dhcpmon.exe.50057f0.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.0.dhcpmon.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 26.2.dhcpmon.exe.38fb7ae.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.61a4629.23.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.dhcpmon.exe.43505e4.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.817260722.exe.4c52bd0.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 25.2.817260722.exe.3c405e4.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.47ead29.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.3d8b7ae.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.46e07ba.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.3d94c0d.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.494246a.20.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.47e18ca.14.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.46cc18d.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.49472a0.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.46bff59.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.817260722.exe.494b8c9.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000001B.00000000.405977261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.472449366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000000.402793573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.503116649.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000000.401893564.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.541901442.00000000061A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000017.00000002.463307851.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000016.00000002.464025874.0000000004F68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000000.285295019.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000000.407444075.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000000.403577767.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000000.287351105.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000000.410685573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000000.285999073.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000002.479219772.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000002.482709358.00000000038B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000000.407245054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000000.400965015.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.521606839.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.300265588.0000000004C18000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000000.286707443.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000000.405195621.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000013.00000002.450499037.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000002.445781920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000000.402553165.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001A.00000002.463553299.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000000.404372234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.529472425.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.489581355.0000000003301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.491136642.0000000004309000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000002.458881687.0000000003BF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000000.399382849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000019.00000002.456948482.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: 817260722.exe PID: 740, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: 817260722.exe PID: 3176, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: 817260722.exe PID: 3452, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 392, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3808, type: MEMORYSTR
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Windows Management Instrumentation
    1
    Scheduled Task/Job
    12
    Process Injection
    2
    Masquerading
    21
    Input Capture
    1
    System Time Discovery
    Remote Services21
    Input Capture
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default Accounts1
    Scheduled Task/Job
    Boot or Logon Initialization Scripts1
    Scheduled Task/Job
    1
    Disable or Modify Tools
    LSASS Memory1
    Query Registry
    Remote Desktop Protocol11
    Archive Collected Data
    Exfiltration Over Bluetooth1
    Non-Standard Port
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
    Virtualization/Sandbox Evasion
    Security Account Manager211
    Security Software Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
    Remote Access Software
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)12
    Process Injection
    NTDS2
    Process Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer1
    Non-Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Deobfuscate/Decode Files or Information
    LSA Secrets21
    Virtualization/Sandbox Evasion
    SSHKeyloggingData Transfer Size Limits21
    Application Layer Protocol
    Manipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    Hidden Files and Directories
    Cached Domain Credentials1
    Application Window Discovery
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup Items3
    Obfuscated Files or Information
    DCSync13
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job13
    Software Packing
    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 673334 Sample: 817260722.exe Startdate: 26/07/2022 Architecture: WINDOWS Score: 100 48 xp230522.ddns.net 2->48 52 Snort IDS alert for network traffic 2->52 54 Multi AV Scanner detection for domain / URL 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 13 other signatures 2->58 9 817260722.exe 3 2->9         started        13 dhcpmon.exe 3 2->13         started        15 dhcpmon.exe 2 2->15         started        17 817260722.exe 2 2->17         started        signatures3 process4 file5 46 C:\Users\user\AppData\...\817260722.exe.log, ASCII 9->46 dropped 62 Uses schtasks.exe or at.exe to add and modify task schedules 9->62 19 817260722.exe 1 15 9->19         started        24 dhcpmon.exe 13->24         started        26 dhcpmon.exe 15->26         started        28 817260722.exe 2 17->28         started        signatures6 process7 dnsIp8 50 xp230522.ddns.net 107.182.129.51, 1996, 49762, 49771 META-ASUS Reserved 19->50 38 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->38 dropped 40 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 19->40 dropped 42 C:\Users\user\AppData\Local\...\tmpBBF1.tmp, XML 19->42 dropped 44 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 19->44 dropped 60 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->60 30 schtasks.exe 1 19->30         started        32 schtasks.exe 1 19->32         started        file9 signatures10 process11 process12 34 conhost.exe 30->34         started        36 conhost.exe 32->36         started       

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    817260722.exe28%VirustotalBrowse
    817260722.exe12%ReversingLabsByteCode-MSIL.Backdoor.NanoBot
    817260722.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe12%ReversingLabsByteCode-MSIL.Backdoor.NanoBot
    SourceDetectionScannerLabelLinkDownload
    27.0.dhcpmon.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    4.0.817260722.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    25.0.817260722.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    26.0.dhcpmon.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    25.0.817260722.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    25.0.817260722.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    27.0.dhcpmon.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    27.0.dhcpmon.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    4.2.817260722.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    25.0.817260722.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    26.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    27.0.dhcpmon.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    4.0.817260722.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    25.2.817260722.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    26.0.dhcpmon.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    4.0.817260722.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    25.0.817260722.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    4.0.817260722.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    27.0.dhcpmon.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    27.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    26.0.dhcpmon.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    4.0.817260722.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    26.0.dhcpmon.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    4.2.817260722.exe.61a0000.22.unpack100%AviraTR/NanoCore.fadteDownload File
    26.0.dhcpmon.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    SourceDetectionScannerLabelLink
    xp230522.ddns.net14%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://www.sajatypeworks.comiv0%URL Reputationsafe
    http://www.sajatypeworks.com20%URL Reputationsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.fontbureau.comessed0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.galapagosdesign.com/Wwo0%Avira URL Cloudsafe
    http://www.fontbureau.comFJ0%Avira URL Cloudsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/20%URL Reputationsafe
    http://www.fontbureau.commn0%Avira URL Cloudsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/)0%URL Reputationsafe
    http://www.fontbureau.comrsiv0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.sajatypeworks.coma0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    http://www.founder.com.cn/cnl-p0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/S0%URL Reputationsafe
    http://www.fontbureau.comcomd0%URL Reputationsafe
    http://www.fontbureau.comS0%URL Reputationsafe
    http://www.fontbureau.commeta0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/J0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/S.0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/A0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/;0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.fontbureau.comoitu0%URL Reputationsafe
    http://www.founder.com.cR0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/n0%URL Reputationsafe
    http://en.w10%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/e0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    xp230522.ddns.net
    107.182.129.51
    truetrueunknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.fontbureau.com/designersG817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.sajatypeworks.comiv817260722.exe, 00000000.00000003.241925223.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244569703.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.240770010.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242521335.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244046297.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244440753.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242064474.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244486744.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241500552.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242047608.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243744055.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243503277.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.240903831.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242120532.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241145484.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244674252.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243012857.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241899507.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244917504.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241322511.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242241772.000000000602B000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.sajatypeworks.com2817260722.exe, 00000000.00000003.241925223.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244569703.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242521335.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244046297.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244440753.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242064474.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244486744.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241500552.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242047608.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243744055.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243503277.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.240903831.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242120532.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241145484.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244674252.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243012857.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241899507.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244917504.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241322511.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242241772.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242357793.000000000602B000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.fontbureau.com/designers/?817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.founder.com.cn/cn/bThe817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.fontbureau.com/designers?817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.tiro.com817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com/designers817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.comessed817260722.exe, 00000000.00000003.250760884.0000000006017000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.251039869.0000000006018000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.goodfont.co.kr817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://google.com817260722.exe, 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.534293388.0000000004857000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000004.00000002.545525564.0000000007120000.00000004.08000000.00040000.00000000.sdmp, 817260722.exe, 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.galapagosdesign.com/Wwo817260722.exe, 00000000.00000003.253051505.0000000006040000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.comFJ817260722.exe, 00000000.00000003.250760884.0000000006017000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.251039869.0000000006018000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.sajatypeworks.com817260722.exe, 00000000.00000003.241925223.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244569703.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242521335.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244046297.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244440753.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242064474.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244486744.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241500552.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242047608.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243744055.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243503277.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.240903831.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242120532.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241145484.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244674252.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243012857.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241899507.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244917504.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241322511.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242241772.000000000602B000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.typography.netD817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cn/cThe817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.galapagosdesign.com/staff/dennis.htm817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://fontfabrik.com817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.jiyu-kobo.co.jp/2817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.commn817260722.exe, 00000000.00000003.258130705.000000000601A000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.galapagosdesign.com/DPlease817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.jiyu-kobo.co.jp/)817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.comrsiv817260722.exe, 00000000.00000003.250760884.0000000006017000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.251039869.0000000006018000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fonts.com817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.sandoll.co.kr817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.sajatypeworks.coma817260722.exe, 00000000.00000003.241925223.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244569703.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.240770010.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242521335.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244046297.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244440753.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242064474.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244486744.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241500552.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242047608.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243744055.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243503277.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.240903831.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242120532.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241145484.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244674252.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243012857.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241899507.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.244917504.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.241322511.000000000602B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242241772.000000000602B000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.urwpp.deDPlease817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.zhongyicts.com.cn817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.sakkal.com817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cnl-p817260722.exe, 00000000.00000003.243130133.0000000006017000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.apache.org/licenses/LICENSE-2.0817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.jiyu-kobo.co.jp/S817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.comcomd817260722.exe, 00000000.00000003.250760884.0000000006017000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.251039869.0000000006018000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.comS817260722.exe, 00000000.00000003.250760884.0000000006017000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.251039869.0000000006018000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.commeta817260722.exe, 00000000.00000003.258130705.000000000601A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/J817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/jp/S.817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/A817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/jp/817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.coml817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/;817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/cabarga.htmlN817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.founder.com.cn/cn817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.242961498.0000000006017000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243040917.0000000006018000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.243130133.0000000006017000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/frere-user.html817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.comoitu817260722.exe, 00000000.00000002.302715868.0000000006010000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.258130705.000000000601A000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.289887408.0000000006010000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cR817260722.exe, 00000000.00000003.243130133.0000000006017000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/n817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://en.w1817260722.exe, 00000000.00000003.241136748.0000000006016000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.com/designers8817260722.exe, 00000000.00000002.302981779.0000000007222000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/e817260722.exe, 00000000.00000003.245716578.000000000601B000.00000004.00000800.00020000.00000000.sdmp, 817260722.exe, 00000000.00000003.245591187.000000000601B000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          107.182.129.51
                          xp230522.ddns.netReserved
                          11070META-ASUStrue
                          Joe Sandbox Version:35.0.0 Citrine
                          Analysis ID:673334
                          Start date and time: 26/07/202208:52:092022-07-26 08:52:09 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 12m 34s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Sample file name:817260722.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:35
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@18/11@9/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 45
                          • Number of non-executed functions: 5
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Adjust boot time
                          • Enable AMSI
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                          • Excluded IPs from analysis (whitelisted): 23.211.6.115, 52.242.101.226, 52.152.110.14, 20.54.89.106, 20.223.24.244, 40.125.122.176
                          • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, e12564.dspb.akamaiedge.net, rp-consumer-prod-displaycatalog-geomap.trafficmanager.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          TimeTypeDescription
                          08:53:31API Interceptor666x Sleep call for process: 817260722.exe modified
                          08:53:45AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          08:53:46Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\817260722.exe" s>$(Arg0)
                          08:53:52Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                          08:54:17API Interceptor2x Sleep call for process: dhcpmon.exe modified
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          xp230522.ddns.netSecuriteInfo.com.W32.AIDetectNet.01.24251.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          RFQ.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          112_12_07_22.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          SecuriteInfo.com.W32.AIDetectNet.01.24438.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          INVOICE_.EXEGet hashmaliciousBrowse
                          • 212.192.246.194
                          510_0107_2022.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          SecuriteInfo.com.Trojan.PackedNET.1400.30765.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          SecuriteInfo.com.W32.AIDetectNet.01.5321.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          Swift.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          Specifications.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          0932062722.exeGet hashmaliciousBrowse
                          • 212.192.246.194
                          PO101.exeGet hashmaliciousBrowse
                          • 37.0.8.138
                          SecuriteInfo.com.W32.AIDetectNet.01.17169.exeGet hashmaliciousBrowse
                          • 37.0.8.138
                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          META-ASUSDoc57120.exeGet hashmaliciousBrowse
                          • 107.182.129.59
                          SecuriteInfo.com.Variant.Ursu.588815.10992.exeGet hashmaliciousBrowse
                          • 107.182.128.57
                          SecuriteInfo.com.W32.AIDetectNet.01.10336.exeGet hashmaliciousBrowse
                          • 107.182.128.57
                          SOA.exeGet hashmaliciousBrowse
                          • 107.182.128.57
                          DtkPfyKAk1.exeGet hashmaliciousBrowse
                          • 107.182.128.19
                          Nljo6No1E3.exeGet hashmaliciousBrowse
                          • 107.182.128.19
                          GQ0zfI2LvU.exeGet hashmaliciousBrowse
                          • 107.182.128.19
                          No context
                          No context
                          Process:C:\Users\user\Desktop\817260722.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):992768
                          Entropy (8bit):7.867282697244028
                          Encrypted:false
                          SSDEEP:24576:7/kcDw4UZvybcv8vOqWUWJzBki7gg4RHar4BPstTxDP:YcD6d82/UWJz37Chy4atB
                          MD5:C02F8B6DCA006868BB1586AE16677695
                          SHA1:7AF3266B07123E13FF02D937508D99B6BF36F9F2
                          SHA-256:8E4B447CE039F31DE8964545B7CCFB839622A7AB6822268DDD8D7646C5166A56
                          SHA-512:DD10857A0A10E9C70C3544AD4677A0A8C41CBB2B66ACCF862862A55D659A1D137056385300074A7C3F0D69402B4359CA711EC0E13907D2E74EBB948D1555840B
                          Malicious:true
                          Antivirus:
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          • Antivirus: ReversingLabs, Detection: 12%
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....[.b..............0......X........... ........@.. ....................................@.................................p...O.......`U...................`....................................................... ............... ..H............text........ ...................... ..`.rsrc...`U.......V..................@..@.reloc.......`.......$..............@..B........................H........:..................X............................................0............{....o.....+..*....0..<.........{....o....u!........,...{....o....od....(....[.+..s....z.*.0............{....o ....+..*....0............{....oA....+..*....0............{....o ...e#......n@[.+..*.0..6.........{.....o.....{.....{.....o....o>....{....o&...Z[.+..*...0............{.....o.....+..*...0............{.....o.....+..*...0..U.........{....u.........,...{....u....oZ....+,.{....u.........,
                          Process:C:\Users\user\Desktop\817260722.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):26
                          Entropy (8bit):3.95006375643621
                          Encrypted:false
                          SSDEEP:3:ggPYV:rPYV
                          MD5:187F488E27DB4AF347237FE461A079AD
                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                          Malicious:true
                          Reputation:high, very likely benign file
                          Preview:[ZoneTransfer]....ZoneId=0
                          Process:C:\Users\user\Desktop\817260722.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1308
                          Entropy (8bit):5.345811588615766
                          Encrypted:false
                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                          MD5:2E016B886BDB8389D2DD0867BE55F87B
                          SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                          SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                          SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                          Malicious:true
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                          Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1308
                          Entropy (8bit):5.345811588615766
                          Encrypted:false
                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                          MD5:2E016B886BDB8389D2DD0867BE55F87B
                          SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                          SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                          SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                          Malicious:false
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                          Process:C:\Users\user\Desktop\817260722.exe
                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1299
                          Entropy (8bit):5.120308906890946
                          Encrypted:false
                          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0YuDxtn:cbk4oL600QydbQxIYODOLedq3Aj
                          MD5:6427154961CD2260C86D629D5B9A7391
                          SHA1:F17A93F5406E06829FD7ECB121C7AB496F05B807
                          SHA-256:83C13F557578C04DB8AA0085E953E5C9834381A8210735E8B73C9AF3759531CA
                          SHA-512:3F9904E28E6D7E2F7914256FD17AF49DC4EE91F1695978CD99728B389E07A641F0B2E8AA9739C7B5A087E81AC56DE2D4F6FE5F12A5D0256ACA0CAAC702D30462
                          Malicious:true
                          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                          Process:C:\Users\user\Desktop\817260722.exe
                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1310
                          Entropy (8bit):5.109425792877704
                          Encrypted:false
                          SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                          MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                          SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                          SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                          SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                          Malicious:false
                          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                          Process:C:\Users\user\Desktop\817260722.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):232
                          Entropy (8bit):7.089541637477408
                          Encrypted:false
                          SSDEEP:3:XrURGizD7cnRNGbgCFKRNX/pBK0jCV83ne+VdWPiKgmR7kkmefoeLBizbCuVkqYM:X4LDAnybgCFcps0OafmCYDlizZr/i/Oh
                          MD5:9E7D0351E4DF94A9B0BADCEB6A9DB963
                          SHA1:76C6A69B1C31CEA2014D1FD1E222A3DD1E433005
                          SHA-256:AAFC7B40C5FE680A2BB549C3B90AABAAC63163F74FFFC0B00277C6BBFF88B757
                          SHA-512:93CCF7E046A3C403ECF8BC4F1A8850BA0180FE18926C98B297C5214EB77BC212C8FBCC58412D0307840CF2715B63BE68BACDA95AA98E82835C5C53F17EF38511
                          Malicious:false
                          Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&
                          Process:C:\Users\user\Desktop\817260722.exe
                          File Type:Non-ISO extended-ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):8
                          Entropy (8bit):3.0
                          Encrypted:false
                          SSDEEP:3:oml:oQ
                          MD5:E145FE5A7D16B118DAFC88848641792E
                          SHA1:ECE7E8FC87B8A03A374D9FC48F181D017BA641AF
                          SHA-256:DA864D411ADE61FAB6FDF61105FA895BC3BA6B0141C137E38C6FF951DC5D42EE
                          SHA-512:FA4ED94BEF724BA1BAE9A76885C969E7C471969565791CB59975B03C1CDB99765506069AC7E1BCE00EC36E8E4EA8C3E3300C77B08C6AFCCB085D2FB9E73AAAFD
                          Malicious:true
                          Preview:.0..n.H
                          Process:C:\Users\user\Desktop\817260722.exe
                          File Type:data
                          Category:modified
                          Size (bytes):40
                          Entropy (8bit):5.153055907333276
                          Encrypted:false
                          SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                          MD5:4E5E92E2369688041CC82EF9650EDED2
                          SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                          SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                          SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                          Malicious:false
                          Preview:9iH...}Z.4..f.~a........~.~.......3.U.
                          Process:C:\Users\user\Desktop\817260722.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):327768
                          Entropy (8bit):7.999367066417797
                          Encrypted:true
                          SSDEEP:6144:oX44S90aTiB66x3PlZmqze1d1wI8lkWmtjJ/3Exi:LkjbU7LjGxi
                          MD5:2E52F446105FBF828E63CF808B721F9C
                          SHA1:5330E54F238F46DC04C1AC62B051DB4FCD7416FB
                          SHA-256:2F7479AA2661BD259747BC89106031C11B3A3F79F12190E7F19F5DF65B7C15C8
                          SHA-512:C08BA0E3315E2314ECBEF38722DF834C2CB8412446A9A310F41A8F83B4AC5984FCC1B26A1D8B0D58A730FDBDD885714854BDFD04DCDF7F582FC125F552D5C3CA
                          Malicious:false
                          Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                          Process:C:\Users\user\Desktop\817260722.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):36
                          Entropy (8bit):4.159799224314526
                          Encrypted:false
                          SSDEEP:3:oNt+WfWdUFbN:oNwvW5N
                          MD5:FB032E653E2D3AAB9B7EF4720C1EC712
                          SHA1:2CE648123A91860CF36A6F98060AD5B3B04E5B3A
                          SHA-256:969E697C03F3AAE06B4542770C7A94743DFB12541401860241AA757FDB4A863A
                          SHA-512:49B188F7C86E0D5C1B6FF2B406C3FBA1F21584D5813E3C1873CCAB35E8D7C0C71754884DA43E04755E8380328AEBFCA71144AB7621358249E63C18DF8DFA704F
                          Malicious:false
                          Preview:C:\Users\user\Desktop\817260722.exe
                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):7.867282697244028
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                          • Win32 Executable (generic) a (10002005/4) 49.78%
                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          • DOS Executable Generic (2002/1) 0.01%
                          File name:817260722.exe
                          File size:992768
                          MD5:c02f8b6dca006868bb1586ae16677695
                          SHA1:7af3266b07123e13ff02d937508d99b6bf36f9f2
                          SHA256:8e4b447ce039f31de8964545b7ccfb839622a7ab6822268ddd8d7646c5166a56
                          SHA512:dd10857a0a10e9c70c3544ad4677a0a8c41cbb2b66accf862862a55d659a1d137056385300074a7c3f0d69402b4359ca711ec0e13907d2e74ebb948d1555840b
                          SSDEEP:24576:7/kcDw4UZvybcv8vOqWUWJzBki7gg4RHar4BPstTxDP:YcD6d82/UWJz37Chy4atB
                          TLSH:122512292BB58F07DDBC43F94414051497F269263552FB6C4EC2F0DE3B63BA16A4BA0B
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....[.b..............0......X........... ........@.. ....................................@................................
                          Icon Hash:21ccc4aab8e872b6
                          Entrypoint:0x4eebc2
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x62DF5BE0 [Tue Jul 26 03:13:36 2022 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Instruction
                          jmp dword ptr [00402000h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xeeb700x4f.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xf00000x5560.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xf60000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000xecbc80xecc00False0.9017611123944034data7.8696025520130615IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0xf00000x55600x5600False0.9682957848837209data7.864746362382201IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0xf60000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountry
                          RT_ICON0xf00c80x5138PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                          RT_GROUP_ICON0xf52100x14data
                          RT_VERSION0xf52340x328data
                          DLLImport
                          mscoree.dll_CorExeMain
                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                          107.182.129.51192.168.2.41996497792841753 07/26/22-08:55:05.636741TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)199649779107.182.129.51192.168.2.4
                          192.168.2.4107.182.129.514977519962025019 07/26/22-08:54:33.689316TCP2025019ET TROJAN Possible NanoCore C2 60B497751996192.168.2.4107.182.129.51
                          192.168.2.4107.182.129.514976219962025019 07/26/22-08:53:53.215216TCP2025019ET TROJAN Possible NanoCore C2 60B497621996192.168.2.4107.182.129.51
                          192.168.2.4107.182.129.514977519962816766 07/26/22-08:54:35.365504TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497751996192.168.2.4107.182.129.51
                          107.182.129.51192.168.2.41996497752810290 07/26/22-08:54:35.365326TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 1199649775107.182.129.51192.168.2.4
                          192.168.2.4107.182.129.514977319962816766 07/26/22-08:54:16.285458TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497731996192.168.2.4107.182.129.51
                          192.168.2.4107.182.129.514977119962816766 07/26/22-08:54:04.771142TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497711996192.168.2.4107.182.129.51
                          192.168.2.4107.182.129.514977919962025019 07/26/22-08:55:00.885923TCP2025019ET TROJAN Possible NanoCore C2 60B497791996192.168.2.4107.182.129.51
                          192.168.2.4107.182.129.514977319962025019 07/26/22-08:54:13.559623TCP2025019ET TROJAN Possible NanoCore C2 60B497731996192.168.2.4107.182.129.51
                          192.168.2.4107.182.129.514977819962816766 07/26/22-08:54:53.184638TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497781996192.168.2.4107.182.129.51
                          107.182.129.51192.168.2.41996497942841753 07/26/22-08:55:42.370175TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)199649794107.182.129.51192.168.2.4
                          107.182.129.51192.168.2.41996497792810451 07/26/22-08:55:06.388908TCP2810451ETPRO TROJAN NanoCore RAT Keepalive Response 3199649779107.182.129.51192.168.2.4
                          192.168.2.4107.182.129.514978519962025019 07/26/22-08:55:15.036847TCP2025019ET TROJAN Possible NanoCore C2 60B497851996192.168.2.4107.182.129.51
                          192.168.2.4107.182.129.514977419962816766 07/26/22-08:54:23.860613TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497741996192.168.2.4107.182.129.51
                          192.168.2.4107.182.129.514979419962025019 07/26/22-08:55:22.282600TCP2025019ET TROJAN Possible NanoCore C2 60B497941996192.168.2.4107.182.129.51
                          192.168.2.4107.182.129.514977919962816766 07/26/22-08:55:06.145125TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497791996192.168.2.4107.182.129.51
                          192.168.2.4107.182.129.514977119962025019 07/26/22-08:54:03.620309TCP2025019ET TROJAN Possible NanoCore C2 60B497711996192.168.2.4107.182.129.51
                          192.168.2.4107.182.129.514977419962025019 07/26/22-08:54:23.649948TCP2025019ET TROJAN Possible NanoCore C2 60B497741996192.168.2.4107.182.129.51
                          192.168.2.4107.182.129.514977819962025019 07/26/22-08:54:51.216057TCP2025019ET TROJAN Possible NanoCore C2 60B497781996192.168.2.4107.182.129.51
                          192.168.2.4107.182.129.514976219962816766 07/26/22-08:53:54.627995TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497621996192.168.2.4107.182.129.51
                          107.182.129.51192.168.2.41996497742841753 07/26/22-08:54:28.522053TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)199649774107.182.129.51192.168.2.4
                          192.168.2.4107.182.129.514978519962816766 07/26/22-08:55:16.155273TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497851996192.168.2.4107.182.129.51
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 26, 2022 08:53:52.978214025 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.007038116 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.007196903 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.215215921 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.261281967 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.278770924 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.307236910 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.447935104 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.507925034 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.597664118 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.597764969 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.691245079 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.776750088 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.776808977 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.776850939 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.776922941 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.776926041 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.777232885 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.805860043 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.805922985 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.805963039 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.806004047 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.806025028 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.806041956 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.806072950 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.806082964 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.806128025 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.806166887 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.806209087 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.806219101 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.834439039 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.834500074 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.834557056 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.834595919 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.834603071 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.834661007 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.834701061 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.834753036 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.834794998 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.834826946 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.834847927 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.834853888 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.834892988 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.834944963 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.834986925 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.835036993 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.835079908 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.835133076 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.835156918 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.835180044 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.835731030 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.863464117 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.863526106 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.863565922 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.863606930 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.863648891 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.863677025 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.863687038 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.863722086 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.863727093 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.863766909 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.863776922 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.863805056 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.863845110 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.863852024 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.863883972 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.863925934 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.863930941 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.863967896 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.864005089 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.864013910 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.864044905 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.864084959 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.864093065 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.864124060 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.864197016 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.864232063 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.864238024 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.864279032 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.864284039 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.864321947 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.864360094 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.864399910 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.864429951 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.864439011 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.864440918 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.864572048 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.864613056 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.864641905 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.864650011 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.864677906 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.864689112 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.864729881 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.864778996 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.896900892 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.896960020 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.897001028 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.897042036 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.897043943 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.897083044 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.897089958 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.897121906 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.897136927 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.897164106 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.897202015 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.897227049 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.897247076 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.897350073 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.897363901 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.897391081 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.897463083 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.897471905 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.897504091 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.897542000 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.897558928 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.897628069 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.897689104 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.897730112 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.897744894 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.897772074 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.897833109 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.897876978 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.897933006 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.897953987 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.897973061 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.898011923 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.898020029 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.898051023 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.898091078 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.898109913 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.898130894 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.898169041 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.898207903 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.898207903 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.898267031 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.898292065 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.898333073 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.898385048 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.898390055 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.898475885 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.898526907 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.898545027 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.898586035 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.898626089 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.898672104 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.898722887 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.898797989 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.898852110 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.898855925 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.898915052 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.898917913 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.898983955 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.899022102 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.899033070 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.899063110 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.899104118 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.899106026 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.899142027 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.899182081 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.899188995 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.899223089 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.899266005 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.899307013 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.899322987 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.899346113 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.899388075 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.925889015 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.925959110 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.926002026 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.926033020 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.926040888 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.926075935 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.926083088 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.926125050 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.926165104 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.926179886 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.926204920 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.926248074 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.926260948 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.926290035 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.926333904 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.926358938 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.926373005 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.926397085 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.926414013 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.926470041 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.926522017 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.926564932 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.926603079 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.926640034 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.926644087 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.926685095 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.926806927 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.927068949 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927110910 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927140951 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.927150965 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927191019 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927239895 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927273989 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.927283049 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927323103 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927340031 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.927397966 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927405119 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.927438974 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927476883 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927495956 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.927516937 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927556038 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927572012 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.927597046 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927638054 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927675962 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927705050 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.927748919 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927791119 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927828074 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.927829027 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927865982 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.927869081 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927910089 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927949905 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.927964926 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.927990913 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.928026915 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.928028107 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.928067923 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.928136110 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.949727058 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.949791908 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.949832916 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.949872971 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.949911118 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.949925900 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.949950933 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.949980974 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.949991941 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.956172943 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.956265926 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.956304073 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.956306934 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.956348896 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.956367970 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.956388950 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.956428051 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.956468105 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.956490040 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.956559896 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.956598997 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.956619024 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.956639051 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.956680059 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.956692934 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.956717968 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.956757069 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.956775904 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.956795931 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.956835985 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.956849098 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.956876040 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.956891060 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.956914902 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.956954956 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.956971884 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.956995964 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957035065 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957051039 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.957091093 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957133055 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957170963 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957186937 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.957210064 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957227945 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.957253933 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957292080 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957313061 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.957331896 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957370996 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957381964 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.957412004 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957452059 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957492113 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957521915 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.957531929 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957545996 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.957571983 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957609892 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957643032 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.957650900 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957690954 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957705021 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.957731962 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957772970 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957808971 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.957812071 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957851887 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957873106 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.957890034 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957928896 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.957988024 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.980504990 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.980581999 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.980601072 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.980624914 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.980664968 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.980705976 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.980726004 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.980746031 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.980771065 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.980783939 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.980823040 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.980861902 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.980885983 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.980902910 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.980914116 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.986854076 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.986918926 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.986960888 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.986984968 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.987001896 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987010956 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.987044096 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987082958 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987098932 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.987123966 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987164974 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987194061 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.987201929 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987245083 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987260103 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.987289906 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987330914 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987349987 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.987373114 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987411976 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987441063 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.987451077 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987490892 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987520933 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.987530947 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987576962 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987596989 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.987616062 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987656116 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987663984 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.987696886 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987735033 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987759113 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.987776041 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987814903 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987824917 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.987853050 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987891912 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987905979 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.987931013 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987970114 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.987981081 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.988010883 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988049030 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988059998 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.988089085 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988126993 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988136053 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.988166094 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988208055 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988213062 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.988249063 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988287926 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988296986 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.988328934 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988365889 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988404989 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988413095 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.988445044 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988506079 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.988516092 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988557100 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988564968 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.988595963 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988635063 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988652945 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.988675117 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988715887 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988728046 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.988754034 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988792896 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988807917 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.988832951 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988871098 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988908052 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.988909006 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988948107 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.988966942 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.988987923 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.989028931 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.989047050 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.989065886 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.989105940 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.989124060 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.989145041 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.989182949 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.989197969 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.989222050 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.989268064 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.989308119 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.989322901 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.989346981 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.989355087 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:53.989383936 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.989413977 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:53.989471912 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:54.627995014 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:53:54.714490891 CEST199649762107.182.129.51192.168.2.4
                          Jul 26, 2022 08:53:56.357227087 CEST497621996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:03.386624098 CEST497711996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:03.415249109 CEST199649771107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:03.415374994 CEST497711996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:03.620309114 CEST497711996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:03.678802967 CEST199649771107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:03.745728016 CEST497711996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:03.840980053 CEST497711996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:03.870060921 CEST199649771107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:03.948828936 CEST497711996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:04.146765947 CEST497711996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:04.234057903 CEST199649771107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:04.366350889 CEST199649771107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:04.448879004 CEST497711996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:04.477576017 CEST199649771107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:04.652048111 CEST497711996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:04.771142006 CEST497711996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:04.859194994 CEST199649771107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:05.533945084 CEST497711996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:05.611884117 CEST199649771107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:05.908472061 CEST497711996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:13.530257940 CEST497731996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:13.558666945 CEST199649773107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:13.558779955 CEST497731996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:13.559623003 CEST497731996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:13.613425970 CEST199649773107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:13.616261959 CEST497731996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:13.644614935 CEST199649773107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:13.855905056 CEST497731996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:13.861375093 CEST497731996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:13.952229977 CEST199649773107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:13.981487989 CEST497731996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:14.061517000 CEST199649773107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:14.064140081 CEST199649773107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:14.068234921 CEST497731996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:14.095881939 CEST199649773107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:14.168715000 CEST497731996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:14.197007895 CEST199649773107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:14.198462009 CEST497731996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:14.226417065 CEST199649773107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:14.226520061 CEST497731996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:14.254532099 CEST199649773107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:14.319783926 CEST497731996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:14.406357050 CEST199649773107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:14.406445026 CEST497731996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:14.499090910 CEST199649773107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:16.285458088 CEST497731996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:16.285751104 CEST497731996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:23.452167988 CEST497741996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:23.485524893 CEST199649774107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:23.485651016 CEST497741996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:23.649947882 CEST497741996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:23.699219942 CEST199649774107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:23.747520924 CEST497741996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:23.763039112 CEST497741996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:23.791692972 CEST199649774107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:23.860613108 CEST497741996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:23.946584940 CEST199649774107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:24.511435032 CEST497741996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:24.592962027 CEST199649774107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:24.777307034 CEST199649774107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:24.841284990 CEST497741996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:24.868973017 CEST199649774107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:24.950670004 CEST497741996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:25.120768070 CEST497741996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:25.213197947 CEST199649774107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:28.522053003 CEST199649774107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:28.587450027 CEST497741996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:29.015083075 CEST497741996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:33.660444975 CEST497751996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:33.688561916 CEST199649775107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:33.688705921 CEST497751996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:33.689316034 CEST497751996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:33.748667955 CEST199649775107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:33.749389887 CEST497751996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:33.778587103 CEST199649775107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:33.858119965 CEST497751996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:34.184035063 CEST497751996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:34.253637075 CEST199649775107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:34.275924921 CEST497751996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:34.362770081 CEST199649775107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:34.395911932 CEST199649775107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:34.467142105 CEST497751996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:34.498575926 CEST199649775107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:34.635672092 CEST497751996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:34.663841009 CEST199649775107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:34.857769966 CEST497751996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:34.878683090 CEST497751996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:34.908979893 CEST199649775107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:34.967396975 CEST497751996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:35.336613894 CEST497751996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:35.365325928 CEST199649775107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:35.365504026 CEST497751996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:35.460506916 CEST199649775107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:36.651345015 CEST497751996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:50.417645931 CEST497781996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:50.446424961 CEST199649778107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:50.447418928 CEST497781996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:51.216057062 CEST497781996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:51.270708084 CEST199649778107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:51.293893099 CEST497781996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:51.325335026 CEST199649778107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:51.452956915 CEST497781996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:52.177000999 CEST497781996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:52.269355059 CEST199649778107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:52.437879086 CEST199649778107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:52.587872982 CEST497781996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:52.618370056 CEST199649778107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:52.749943972 CEST497781996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:53.184638023 CEST497781996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:53.261656046 CEST199649778107.182.129.51192.168.2.4
                          Jul 26, 2022 08:54:53.631771088 CEST497781996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:54:53.656786919 CEST497781996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:00.576435089 CEST497791996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:00.604935884 CEST199649779107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:00.605060101 CEST497791996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:00.885922909 CEST497791996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:00.943805933 CEST199649779107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:01.172596931 CEST497791996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:01.618530035 CEST497791996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:01.647396088 CEST199649779107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:01.860138893 CEST497791996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:02.220866919 CEST497791996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:02.307275057 CEST199649779107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:05.636740923 CEST199649779107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:05.676698923 CEST497791996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:05.941715002 CEST497791996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:06.019653082 CEST199649779107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:06.145124912 CEST497791996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:06.166625023 CEST199649779107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:06.173223972 CEST199649779107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:06.173315048 CEST497791996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:06.220562935 CEST199649779107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:06.360605001 CEST497791996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:06.388907909 CEST199649779107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:06.469943047 CEST497791996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:07.779798031 CEST497791996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:07.809422016 CEST199649779107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:07.860749006 CEST497791996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:08.537069082 CEST497791996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:14.823761940 CEST497851996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:14.853008986 CEST199649785107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:14.853313923 CEST497851996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:15.036847115 CEST497851996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:15.092988968 CEST199649785107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:15.095506907 CEST497851996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:15.124438047 CEST199649785107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:15.345794916 CEST497851996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:15.469490051 CEST497851996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:15.553868055 CEST199649785107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:16.155272961 CEST497851996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:16.241698027 CEST199649785107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:16.458131075 CEST497851996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:16.553864002 CEST199649785107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:16.669222116 CEST199649785107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:16.788964033 CEST497851996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:16.817260027 CEST199649785107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:16.955174923 CEST497851996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:17.362107992 CEST497851996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:22.254321098 CEST497941996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:22.282088041 CEST199649794107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:22.282248974 CEST497941996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:22.282599926 CEST497941996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:22.335203886 CEST199649794107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:22.335426092 CEST497941996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:22.363761902 CEST199649794107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:22.364265919 CEST497941996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:22.448626041 CEST199649794107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:22.573484898 CEST199649794107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:22.617854118 CEST497941996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:22.645814896 CEST199649794107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:22.646322012 CEST497941996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:22.674510956 CEST199649794107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:22.674715996 CEST497941996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:22.702919006 CEST199649794107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:22.783833027 CEST497941996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:23.810292959 CEST497941996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:23.898113966 CEST199649794107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:27.105079889 CEST199649794107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:27.174870968 CEST497941996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:27.320324898 CEST199649794107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:27.362356901 CEST497941996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:32.336180925 CEST199649794107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:32.472184896 CEST497941996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:35.212557077 CEST199649794107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:35.362998962 CEST497941996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:37.351496935 CEST199649794107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:37.472594976 CEST497941996192.168.2.4107.182.129.51
                          Jul 26, 2022 08:55:42.370174885 CEST199649794107.182.129.51192.168.2.4
                          Jul 26, 2022 08:55:42.472986937 CEST497941996192.168.2.4107.182.129.51
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 26, 2022 08:53:52.932198048 CEST5377553192.168.2.48.8.8.8
                          Jul 26, 2022 08:53:52.954138041 CEST53537758.8.8.8192.168.2.4
                          Jul 26, 2022 08:54:03.358177900 CEST6427753192.168.2.48.8.8.8
                          Jul 26, 2022 08:54:03.379745007 CEST53642778.8.8.8192.168.2.4
                          Jul 26, 2022 08:54:13.476708889 CEST6075853192.168.2.48.8.8.8
                          Jul 26, 2022 08:54:13.496429920 CEST53607588.8.8.8192.168.2.4
                          Jul 26, 2022 08:54:23.008940935 CEST6064753192.168.2.48.8.8.8
                          Jul 26, 2022 08:54:23.028805971 CEST53606478.8.8.8192.168.2.4
                          Jul 26, 2022 08:54:33.637032032 CEST6490953192.168.2.48.8.8.8
                          Jul 26, 2022 08:54:33.656914949 CEST53649098.8.8.8192.168.2.4
                          Jul 26, 2022 08:54:48.913796902 CEST6038153192.168.2.48.8.8.8
                          Jul 26, 2022 08:54:48.935357094 CEST53603818.8.8.8192.168.2.4
                          Jul 26, 2022 08:55:00.332592964 CEST5650953192.168.2.48.8.8.8
                          Jul 26, 2022 08:55:00.352574110 CEST53565098.8.8.8192.168.2.4
                          Jul 26, 2022 08:55:14.797086954 CEST5774753192.168.2.48.8.8.8
                          Jul 26, 2022 08:55:14.819107056 CEST53577478.8.8.8192.168.2.4
                          Jul 26, 2022 08:55:22.223047018 CEST5247253192.168.2.48.8.8.8
                          Jul 26, 2022 08:55:22.242896080 CEST53524728.8.8.8192.168.2.4
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                          Jul 26, 2022 08:53:52.932198048 CEST192.168.2.48.8.8.80x6d0Standard query (0)xp230522.ddns.netA (IP address)IN (0x0001)
                          Jul 26, 2022 08:54:03.358177900 CEST192.168.2.48.8.8.80x1a32Standard query (0)xp230522.ddns.netA (IP address)IN (0x0001)
                          Jul 26, 2022 08:54:13.476708889 CEST192.168.2.48.8.8.80xfbedStandard query (0)xp230522.ddns.netA (IP address)IN (0x0001)
                          Jul 26, 2022 08:54:23.008940935 CEST192.168.2.48.8.8.80x31d7Standard query (0)xp230522.ddns.netA (IP address)IN (0x0001)
                          Jul 26, 2022 08:54:33.637032032 CEST192.168.2.48.8.8.80x929Standard query (0)xp230522.ddns.netA (IP address)IN (0x0001)
                          Jul 26, 2022 08:54:48.913796902 CEST192.168.2.48.8.8.80x4793Standard query (0)xp230522.ddns.netA (IP address)IN (0x0001)
                          Jul 26, 2022 08:55:00.332592964 CEST192.168.2.48.8.8.80xdefeStandard query (0)xp230522.ddns.netA (IP address)IN (0x0001)
                          Jul 26, 2022 08:55:14.797086954 CEST192.168.2.48.8.8.80xd9aeStandard query (0)xp230522.ddns.netA (IP address)IN (0x0001)
                          Jul 26, 2022 08:55:22.223047018 CEST192.168.2.48.8.8.80x2746Standard query (0)xp230522.ddns.netA (IP address)IN (0x0001)
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                          Jul 26, 2022 08:53:52.954138041 CEST8.8.8.8192.168.2.40x6d0No error (0)xp230522.ddns.net107.182.129.51A (IP address)IN (0x0001)
                          Jul 26, 2022 08:54:03.379745007 CEST8.8.8.8192.168.2.40x1a32No error (0)xp230522.ddns.net107.182.129.51A (IP address)IN (0x0001)
                          Jul 26, 2022 08:54:13.496429920 CEST8.8.8.8192.168.2.40xfbedNo error (0)xp230522.ddns.net107.182.129.51A (IP address)IN (0x0001)
                          Jul 26, 2022 08:54:23.028805971 CEST8.8.8.8192.168.2.40x31d7No error (0)xp230522.ddns.net107.182.129.51A (IP address)IN (0x0001)
                          Jul 26, 2022 08:54:33.656914949 CEST8.8.8.8192.168.2.40x929No error (0)xp230522.ddns.net107.182.129.51A (IP address)IN (0x0001)
                          Jul 26, 2022 08:54:48.935357094 CEST8.8.8.8192.168.2.40x4793No error (0)xp230522.ddns.net107.182.129.51A (IP address)IN (0x0001)
                          Jul 26, 2022 08:55:00.352574110 CEST8.8.8.8192.168.2.40xdefeNo error (0)xp230522.ddns.net107.182.129.51A (IP address)IN (0x0001)
                          Jul 26, 2022 08:55:14.819107056 CEST8.8.8.8192.168.2.40xd9aeNo error (0)xp230522.ddns.net107.182.129.51A (IP address)IN (0x0001)
                          Jul 26, 2022 08:55:22.242896080 CEST8.8.8.8192.168.2.40x2746No error (0)xp230522.ddns.net107.182.129.51A (IP address)IN (0x0001)

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:08:53:12
                          Start date:26/07/2022
                          Path:C:\Users\user\Desktop\817260722.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\817260722.exe"
                          Imagebase:0xcb0000
                          File size:992768 bytes
                          MD5 hash:C02F8B6DCA006868BB1586AE16677695
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.300265588.0000000004C18000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.300265588.0000000004C18000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.300265588.0000000004C18000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.295842230.00000000032C8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:4
                          Start time:08:53:34
                          Start date:26/07/2022
                          Path:C:\Users\user\Desktop\817260722.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\817260722.exe
                          Imagebase:0x7b0000
                          File size:992768 bytes
                          MD5 hash:C02F8B6DCA006868BB1586AE16677695
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.541780857.0000000006110000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.541780857.0000000006110000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.541780857.0000000006110000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.503116649.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.503116649.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.503116649.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.541901442.00000000061A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.541901442.00000000061A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.541901442.00000000061A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.541901442.00000000061A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.545978829.0000000007160000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.545978829.0000000007160000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.545978829.0000000007160000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.545365006.0000000007100000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.545365006.0000000007100000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.545365006.0000000007100000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.544982839.0000000006FA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.544982839.0000000006FA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.544982839.0000000006FA0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.545636957.0000000007130000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.545636957.0000000007130000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.545636957.0000000007130000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000000.285295019.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000000.285295019.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000004.00000000.285295019.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.542873005.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.542873005.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.542873005.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.545720029.0000000007140000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.545720029.0000000007140000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.545720029.0000000007140000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.544918423.0000000006F90000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.544918423.0000000006F90000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.544918423.0000000006F90000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.530473929.0000000004610000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000000.287351105.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000000.287351105.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000004.00000000.287351105.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.542974144.00000000066B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.542974144.00000000066B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.542974144.00000000066B0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000000.285999073.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000000.285999073.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000004.00000000.285999073.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.521606839.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000000.286707443.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000000.286707443.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000004.00000000.286707443.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.534293388.0000000004857000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.545436533.0000000007110000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.545436533.0000000007110000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.545436533.0000000007110000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.535384961.0000000004942000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.533556967.00000000047E1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.546062697.0000000007170000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.546062697.0000000007170000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.546062697.0000000007170000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.529472425.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.529472425.0000000003D41000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.545525564.0000000007120000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.545525564.0000000007120000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.545525564.0000000007120000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.546431970.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.546431970.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                          • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000004.00000002.546431970.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.522238425.0000000002DAF000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          Reputation:low

                          Target ID:15
                          Start time:08:53:42
                          Start date:26/07/2022
                          Path:C:\Windows\SysWOW64\schtasks.exe
                          Wow64 process (32bit):true
                          Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpBBF1.tmp
                          Imagebase:0x11a0000
                          File size:185856 bytes
                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:16
                          Start time:08:53:44
                          Start date:26/07/2022
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff647620000
                          File size:625664 bytes
                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:17
                          Start time:08:53:45
                          Start date:26/07/2022
                          Path:C:\Windows\SysWOW64\schtasks.exe
                          Wow64 process (32bit):true
                          Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpC76B.tmp
                          Imagebase:0x11a0000
                          File size:185856 bytes
                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:19
                          Start time:08:53:46
                          Start date:26/07/2022
                          Path:C:\Users\user\Desktop\817260722.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\817260722.exe 0
                          Imagebase:0xe90000
                          File size:992768 bytes
                          MD5 hash:C02F8B6DCA006868BB1586AE16677695
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000013.00000002.424779681.0000000003646000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.450499037.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.450499037.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.450499037.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          Reputation:low

                          Target ID:20
                          Start time:08:53:49
                          Start date:26/07/2022
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff647620000
                          File size:625664 bytes
                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:22
                          Start time:08:53:52
                          Start date:26/07/2022
                          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                          Imagebase:0xff0000
                          File size:992768 bytes
                          MD5 hash:C02F8B6DCA006868BB1586AE16677695
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000016.00000002.464025874.0000000004F68000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.464025874.0000000004F68000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.464025874.0000000004F68000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000016.00000002.451144180.0000000003616000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Antivirus matches:
                          • Detection: 100%, Joe Sandbox ML
                          • Detection: 12%, ReversingLabs
                          Reputation:low

                          Target ID:23
                          Start time:08:53:53
                          Start date:26/07/2022
                          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                          Imagebase:0xef0000
                          File size:992768 bytes
                          MD5 hash:C02F8B6DCA006868BB1586AE16677695
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000017.00000002.463307851.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000017.00000002.463307851.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000017.00000002.463307851.0000000004F98000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000017.00000002.451095329.0000000003646000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:25
                          Start time:08:54:21
                          Start date:26/07/2022
                          Path:C:\Users\user\Desktop\817260722.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\817260722.exe
                          Imagebase:0x7c0000
                          File size:992768 bytes
                          MD5 hash:C02F8B6DCA006868BB1586AE16677695
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000019.00000000.401893564.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000019.00000000.401893564.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000019.00000000.401893564.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000019.00000000.400965015.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000019.00000000.400965015.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000019.00000000.400965015.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000019.00000002.445781920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000019.00000002.445781920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000019.00000002.445781920.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000019.00000000.402553165.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000019.00000000.402553165.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000019.00000000.402553165.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000019.00000002.458881687.0000000003BF9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000019.00000002.458881687.0000000003BF9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000019.00000000.399382849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000019.00000000.399382849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000019.00000000.399382849.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000019.00000002.456948482.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000019.00000002.456948482.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          Reputation:low

                          Target ID:26
                          Start time:08:54:28
                          Start date:26/07/2022
                          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          Imagebase:0x470000
                          File size:992768 bytes
                          MD5 hash:C02F8B6DCA006868BB1586AE16677695
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001A.00000000.402793573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000000.402793573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 0000001A.00000000.402793573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001A.00000000.403577767.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000000.403577767.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 0000001A.00000000.403577767.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000002.479219772.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 0000001A.00000002.479219772.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000002.482709358.00000000038B9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 0000001A.00000002.482709358.00000000038B9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001A.00000000.407245054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000000.407245054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 0000001A.00000000.407245054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001A.00000000.405195621.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000000.405195621.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 0000001A.00000000.405195621.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001A.00000002.463553299.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000002.463553299.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 0000001A.00000002.463553299.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          Reputation:low

                          Target ID:27
                          Start time:08:54:29
                          Start date:26/07/2022
                          Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          Imagebase:0xed0000
                          File size:992768 bytes
                          MD5 hash:C02F8B6DCA006868BB1586AE16677695
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001B.00000000.405977261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000000.405977261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 0000001B.00000000.405977261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001B.00000002.472449366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000002.472449366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 0000001B.00000002.472449366.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001B.00000000.407444075.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000000.407444075.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 0000001B.00000000.407444075.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001B.00000000.410685573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000000.410685573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 0000001B.00000000.410685573.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001B.00000000.404372234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000000.404372234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 0000001B.00000000.404372234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000002.489581355.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 0000001B.00000002.489581355.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000002.491136642.0000000004309000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 0000001B.00000002.491136642.0000000004309000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          Reputation:low

                          Reset < >

                            Execution Graph

                            Execution Coverage:14%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:166
                            Total number of Limit Nodes:9
                            execution_graph 24188 184bb30 GetCurrentProcess 24189 184bba3 24188->24189 24190 184bbaa GetCurrentThread 24188->24190 24189->24190 24191 184bbe7 GetCurrentProcess 24190->24191 24192 184bbe0 24190->24192 24193 184bc1d 24191->24193 24192->24191 24194 184bc45 GetCurrentThreadId 24193->24194 24195 184bc76 24194->24195 24196 18440d0 24197 18440e2 24196->24197 24198 18440ee 24197->24198 24202 18441e0 24197->24202 24207 1843888 24198->24207 24200 184410d 24203 1844205 24202->24203 24211 18442e0 24203->24211 24215 18442d1 24203->24215 24208 1843893 24207->24208 24223 1845818 24208->24223 24210 1846b63 24210->24200 24213 1844307 24211->24213 24212 18443e4 24212->24212 24213->24212 24219 1843e8c 24213->24219 24217 1844307 24215->24217 24216 18443e4 24216->24216 24217->24216 24218 1843e8c CreateActCtxA 24217->24218 24218->24216 24220 1845370 CreateActCtxA 24219->24220 24222 1845433 24220->24222 24224 1845823 24223->24224 24227 1845878 24224->24227 24226 1846c7d 24226->24210 24228 1845883 24227->24228 24229 18458a8 4 API calls 24228->24229 24230 1846d5a 24229->24230 24230->24226 24025 55e0578 SetWindowLongW 24026 55e05e4 24025->24026 24027 55e6b18 24028 55e6b45 24027->24028 24031 55e66c4 24028->24031 24030 55e6b89 24032 55e66cf 24031->24032 24035 55e69d8 24032->24035 24034 55ebf85 24034->24030 24036 55e69e3 24035->24036 24039 18458a8 24036->24039 24037 55ec524 24037->24034 24040 18458b3 24039->24040 24043 1846da0 24040->24043 24042 1847252 24042->24037 24044 1846dab 24043->24044 24046 1847556 24044->24046 24050 1849719 24044->24050 24054 1849750 24044->24054 24045 1847594 24045->24042 24046->24045 24057 184b859 24046->24057 24051 1849720 24050->24051 24053 1849750 2 API calls 24051->24053 24052 184972e 24052->24046 24053->24052 24062 1849848 24054->24062 24055 184975f 24055->24046 24059 184b889 24057->24059 24058 184b8ad 24058->24045 24059->24058 24082 184ba13 24059->24082 24086 184ba18 24059->24086 24063 184985b 24062->24063 24064 1849873 24063->24064 24070 1849ad0 24063->24070 24074 1849ac1 24063->24074 24064->24055 24065 184986b 24065->24064 24066 1849a70 GetModuleHandleW 24065->24066 24067 1849a9d 24066->24067 24067->24055 24071 1849ae4 24070->24071 24072 1849b09 24071->24072 24078 1848b70 24071->24078 24072->24065 24075 1849ae4 24074->24075 24076 1848b70 LoadLibraryExW 24075->24076 24077 1849b09 24075->24077 24076->24077 24077->24065 24079 1849cb0 LoadLibraryExW 24078->24079 24081 1849d29 24079->24081 24081->24072 24083 184ba25 24082->24083 24085 184ba5f 24083->24085 24090 184a4ec 24083->24090 24085->24058 24087 184ba25 24086->24087 24088 184a4ec 4 API calls 24087->24088 24089 184ba5f 24087->24089 24088->24089 24089->24058 24091 184a4f7 24090->24091 24092 184c758 24091->24092 24094 184a5b0 24091->24094 24095 184a5bb 24094->24095 24096 1846da0 4 API calls 24095->24096 24097 184c7c7 24095->24097 24096->24097 24100 184e550 24097->24100 24098 184c800 24098->24092 24102 184e581 24100->24102 24104 184e672 24100->24104 24101 184e58d 24101->24098 24102->24101 24109 184e9c0 24102->24109 24112 184e9d0 24102->24112 24103 184e5cd 24115 184f388 24103->24115 24120 184f398 24103->24120 24104->24098 24110 1849848 LoadLibraryExW GetModuleHandleW 24109->24110 24111 184e9d9 24110->24111 24111->24103 24113 1849848 LoadLibraryExW GetModuleHandleW 24112->24113 24114 184e9d9 24112->24114 24113->24114 24114->24103 24117 184f3c2 24115->24117 24116 184f469 24116->24116 24117->24116 24118 55e02bb CreateWindowExW CreateWindowExW 24117->24118 24119 55e02e0 CreateWindowExW CreateWindowExW 24117->24119 24118->24116 24119->24116 24121 184f3c2 24120->24121 24122 184f469 24121->24122 24123 55e02bb CreateWindowExW CreateWindowExW 24121->24123 24124 55e02e0 CreateWindowExW CreateWindowExW 24121->24124 24123->24122 24124->24122 24125 155d01c 24126 155d034 24125->24126 24127 155d08e 24126->24127 24132 55e04d8 24126->24132 24137 55e11e8 24126->24137 24143 55e11d8 24126->24143 24149 55e04e8 24126->24149 24133 55e050e 24132->24133 24135 55e11d8 2 API calls 24133->24135 24136 55e11e8 2 API calls 24133->24136 24134 55e052f 24134->24127 24135->24134 24136->24134 24138 55e1215 24137->24138 24139 55e1247 24138->24139 24154 55e143c 24138->24154 24160 55e1360 24138->24160 24165 55e1370 24138->24165 24144 55e1215 24143->24144 24145 55e1247 24144->24145 24146 55e143c 2 API calls 24144->24146 24147 55e1370 2 API calls 24144->24147 24148 55e1360 2 API calls 24144->24148 24146->24145 24147->24145 24148->24145 24150 55e050e 24149->24150 24152 55e11d8 2 API calls 24150->24152 24153 55e11e8 2 API calls 24150->24153 24151 55e052f 24151->24127 24152->24151 24153->24151 24155 55e13fa 24154->24155 24156 55e144a 24154->24156 24170 55e1418 24155->24170 24173 55e1428 24155->24173 24157 55e1410 24157->24139 24162 55e1384 24160->24162 24161 55e1410 24161->24139 24163 55e1418 2 API calls 24162->24163 24164 55e1428 2 API calls 24162->24164 24163->24161 24164->24161 24167 55e1384 24165->24167 24166 55e1410 24166->24139 24168 55e1418 2 API calls 24167->24168 24169 55e1428 2 API calls 24167->24169 24168->24166 24169->24166 24171 55e1439 24170->24171 24176 55e28c2 24170->24176 24171->24157 24174 55e28c2 2 API calls 24173->24174 24175 55e1439 24173->24175 24174->24175 24175->24157 24180 55e28f0 24176->24180 24184 55e28e0 24176->24184 24177 55e28da 24177->24171 24181 55e2932 24180->24181 24183 55e2939 24180->24183 24182 55e298a CallWindowProcW 24181->24182 24181->24183 24182->24183 24183->24177 24185 55e28f0 24184->24185 24186 55e298a CallWindowProcW 24185->24186 24187 55e2939 24185->24187 24186->24187 24187->24177 24231 184bd58 DuplicateHandle 24232 184bdee 24231->24232

                            Control-flow Graph

                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 0184BB90
                            • GetCurrentThread.KERNEL32 ref: 0184BBCD
                            • GetCurrentProcess.KERNEL32 ref: 0184BC0A
                            • GetCurrentThreadId.KERNEL32 ref: 0184BC63
                            Memory Dump Source
                            • Source File: 00000000.00000002.292958564.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1840000_817260722.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: 6d5903906b388869d818312f106f6dece2f15725f84b1132de18faa09f53fa6c
                            • Instruction ID: 1efb2b6d34f77f45a472e8566891e4c873061d2b2cad5713b12b82cc169e6ce0
                            • Opcode Fuzzy Hash: 6d5903906b388869d818312f106f6dece2f15725f84b1132de18faa09f53fa6c
                            • Instruction Fuzzy Hash: 785145B49002488FDB14CFA9C5897AEBBF1FF49314F14845AE009B7761DB34A948CB65
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 0184BB90
                            • GetCurrentThread.KERNEL32 ref: 0184BBCD
                            • GetCurrentProcess.KERNEL32 ref: 0184BC0A
                            • GetCurrentThreadId.KERNEL32 ref: 0184BC63
                            Memory Dump Source
                            • Source File: 00000000.00000002.292958564.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1840000_817260722.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: a9797afd2eaf1f282f1ebc61871b4b7b0f25807425ebc39ae3b28ca694496208
                            • Instruction ID: 1f1907a6095fbb12cb02bea46c0e1d5612fa20b86eb1296fce264952e874c089
                            • Opcode Fuzzy Hash: a9797afd2eaf1f282f1ebc61871b4b7b0f25807425ebc39ae3b28ca694496208
                            • Instruction Fuzzy Hash: E45147B09002498FDB14DFAAC588BEEBBF1FB48314F10845AE409B7760DB75A948CF65
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2261 1849848-184985d call 1848b0c 2264 1849873-1849877 2261->2264 2265 184985f 2261->2265 2266 1849879-1849883 2264->2266 2267 184988b-18498cc 2264->2267 2314 1849865 call 1849ad0 2265->2314 2315 1849865 call 1849ac1 2265->2315 2266->2267 2272 18498ce-18498d6 2267->2272 2273 18498d9-18498e7 2267->2273 2268 184986b-184986d 2268->2264 2269 18499a8-1849a68 2268->2269 2309 1849a70-1849a9b GetModuleHandleW 2269->2309 2310 1849a6a-1849a6d 2269->2310 2272->2273 2274 18498e9-18498ee 2273->2274 2275 184990b-184990d 2273->2275 2277 18498f0-18498f7 call 1848b18 2274->2277 2278 18498f9 2274->2278 2279 1849910-1849917 2275->2279 2281 18498fb-1849909 2277->2281 2278->2281 2282 1849924-184992b 2279->2282 2283 1849919-1849921 2279->2283 2281->2279 2286 184992d-1849935 2282->2286 2287 1849938-1849941 call 1848b28 2282->2287 2283->2282 2286->2287 2292 1849943-184994b 2287->2292 2293 184994e-1849953 2287->2293 2292->2293 2294 1849955-184995c 2293->2294 2295 1849971-1849978 call 1849dc8 2293->2295 2294->2295 2296 184995e-184996e call 1848b38 call 1848b48 2294->2296 2299 184997b-184997e 2295->2299 2296->2295 2302 1849980-184999e 2299->2302 2303 18499a1-18499a7 2299->2303 2302->2303 2311 1849aa4-1849ab8 2309->2311 2312 1849a9d-1849aa3 2309->2312 2310->2309 2312->2311 2314->2268 2315->2268
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000), ref: 01849A8E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.292958564.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1840000_817260722.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID: X
                            • API String ID: 4139908857-3081909835
                            • Opcode ID: 71bc11d644243b527e25ad1de40fe56ffc864a614e9245264ecc947164f8a5bd
                            • Instruction ID: f3d654a46654b9f0b367a7ef26f4c5645211a0f7c2484e1b68f0dd1c90beb4d1
                            • Opcode Fuzzy Hash: 71bc11d644243b527e25ad1de40fe56ffc864a614e9245264ecc947164f8a5bd
                            • Instruction Fuzzy Hash: 8F711570A00B0A8FD724DF69D45475ABBF1BF88318F00892ED486DBB50DB35E949CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2317 55e0324-55e0396 2319 55e0398-55e039e 2317->2319 2320 55e03a1-55e03a8 2317->2320 2319->2320 2321 55e03aa-55e03b0 2320->2321 2322 55e03b3-55e0452 CreateWindowExW 2320->2322 2321->2322 2324 55e045b-55e0493 2322->2324 2325 55e0454-55e045a 2322->2325 2329 55e0495-55e0498 2324->2329 2330 55e04a0 2324->2330 2325->2324 2329->2330 2331 55e04a1 2330->2331 2331->2331
                            APIs
                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 055E0442
                            Memory Dump Source
                            • Source File: 00000000.00000002.301687847.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_55e0000_817260722.jbxd
                            Similarity
                            • API ID: CreateWindow
                            • String ID:
                            • API String ID: 716092398-0
                            • Opcode ID: fbcdb8f31e8ea9c66a21968ce2b788e8f1724461e1605764aba04e2954a9dcab
                            • Instruction ID: d8493ea139290905a237580f8dfb7ed5f96c80402da3f896498f1ba3918020b0
                            • Opcode Fuzzy Hash: fbcdb8f31e8ea9c66a21968ce2b788e8f1724461e1605764aba04e2954a9dcab
                            • Instruction Fuzzy Hash: 2D51E0B1D003489FDF14CFA9C994ADEBBB5FF88314F24812AE819AB250D7B49945CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2332 55e0330-55e0396 2333 55e0398-55e039e 2332->2333 2334 55e03a1-55e03a8 2332->2334 2333->2334 2335 55e03aa-55e03b0 2334->2335 2336 55e03b3-55e0452 CreateWindowExW 2334->2336 2335->2336 2338 55e045b-55e0493 2336->2338 2339 55e0454-55e045a 2336->2339 2343 55e0495-55e0498 2338->2343 2344 55e04a0 2338->2344 2339->2338 2343->2344 2345 55e04a1 2344->2345 2345->2345
                            APIs
                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 055E0442
                            Memory Dump Source
                            • Source File: 00000000.00000002.301687847.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_55e0000_817260722.jbxd
                            Similarity
                            • API ID: CreateWindow
                            • String ID:
                            • API String ID: 716092398-0
                            • Opcode ID: 94f08099ca426f1d185bef413c9fc4be64de6e9808aa12a955ea7fc37e40a104
                            • Instruction ID: cab79a7f18e195fea2dd81f76d08b2068a218e22f337a3c070ad3a1d9f9cd94f
                            • Opcode Fuzzy Hash: 94f08099ca426f1d185bef413c9fc4be64de6e9808aa12a955ea7fc37e40a104
                            • Instruction Fuzzy Hash: 0E41D0B1D003089FDF14CFA9C984ADEBBB5FF88314F24812AE819AB250D7B49945CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2363 1845364-1845431 CreateActCtxA 2365 1845433-1845439 2363->2365 2366 184543a-1845494 2363->2366 2365->2366 2373 1845496-1845499 2366->2373 2374 18454a3-18454a7 2366->2374 2373->2374 2375 18454b8 2374->2375 2376 18454a9-18454b5 2374->2376 2378 18454b9 2375->2378 2376->2375 2378->2378
                            APIs
                            • CreateActCtxA.KERNEL32(?), ref: 01845421
                            Memory Dump Source
                            • Source File: 00000000.00000002.292958564.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1840000_817260722.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: 47ff9c0a3424e9791b42c6af6afa1b5cb3dc19fd98b6458bffdbf95965a34080
                            • Instruction ID: 5782068b28155a44ba2b5be18b61c318d1e0ef56b173bfa27b3bfc832c7bcad7
                            • Opcode Fuzzy Hash: 47ff9c0a3424e9791b42c6af6afa1b5cb3dc19fd98b6458bffdbf95965a34080
                            • Instruction Fuzzy Hash: F041D2B1D00319CFDB24DFA9C884BDDBBB1BF58318F20815AD409AB251DB75594ACFA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2346 1843e8c-1845431 CreateActCtxA 2349 1845433-1845439 2346->2349 2350 184543a-1845494 2346->2350 2349->2350 2357 1845496-1845499 2350->2357 2358 18454a3-18454a7 2350->2358 2357->2358 2359 18454b8 2358->2359 2360 18454a9-18454b5 2358->2360 2362 18454b9 2359->2362 2360->2359 2362->2362
                            APIs
                            • CreateActCtxA.KERNEL32(?), ref: 01845421
                            Memory Dump Source
                            • Source File: 00000000.00000002.292958564.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1840000_817260722.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: be002891217d06f9bb0e9647485a6c4ddf1f105c0bb8d00b8602cfc9d6d09eee
                            • Instruction ID: a3458994087e686d760f9842edf42f22fa5bbcaa80287a6be041b931e00528e6
                            • Opcode Fuzzy Hash: be002891217d06f9bb0e9647485a6c4ddf1f105c0bb8d00b8602cfc9d6d09eee
                            • Instruction Fuzzy Hash: 3141D2B1D0021DCFDB24DFAAC884BDDBBB5BF58308F20805AD409AB251DB756949CFA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2379 55e28f0-55e292c 2380 55e29dc-55e29fc 2379->2380 2381 55e2932-55e2937 2379->2381 2387 55e29ff-55e2a0c 2380->2387 2382 55e298a-55e29c2 CallWindowProcW 2381->2382 2383 55e2939-55e2970 2381->2383 2385 55e29cb-55e29da 2382->2385 2386 55e29c4-55e29ca 2382->2386 2389 55e2979-55e2988 2383->2389 2390 55e2972-55e2978 2383->2390 2385->2387 2386->2385 2389->2387 2390->2389
                            APIs
                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 055E29B1
                            Memory Dump Source
                            • Source File: 00000000.00000002.301687847.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_55e0000_817260722.jbxd
                            Similarity
                            • API ID: CallProcWindow
                            • String ID:
                            • API String ID: 2714655100-0
                            • Opcode ID: 7d94bea9948bf86f03024e86a98b6c916fdc4d88fc16519225e8dd3b71332939
                            • Instruction ID: a2f2fbd15bd396e98df5d776c5baaf7ce231cb1f13f997948645b033f207cf05
                            • Opcode Fuzzy Hash: 7d94bea9948bf86f03024e86a98b6c916fdc4d88fc16519225e8dd3b71332939
                            • Instruction Fuzzy Hash: A1412BB9900205CFDB14CF99C488AAABBF9FB88314F14C459D559AB325D774A845CFA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2393 184bd50-184bdec DuplicateHandle 2394 184bdf5-184be12 2393->2394 2395 184bdee-184bdf4 2393->2395 2395->2394
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0184BDDF
                            Memory Dump Source
                            • Source File: 00000000.00000002.292958564.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1840000_817260722.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 4247d312ef77c25dd21e48fd8b48dbf6333c3010b8f25497a3129db4716d0cbc
                            • Instruction ID: 5cc76c94014e219b404b23b2ecac5520f6759d0da87aa4c8e4706b0cca17ff50
                            • Opcode Fuzzy Hash: 4247d312ef77c25dd21e48fd8b48dbf6333c3010b8f25497a3129db4716d0cbc
                            • Instruction Fuzzy Hash: F721E4B59002489FDB10CFA9D884AEEBFF5FB48324F14841AE955A3710D778A954CF61
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2398 184bd58-184bdec DuplicateHandle 2399 184bdf5-184be12 2398->2399 2400 184bdee-184bdf4 2398->2400 2400->2399
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0184BDDF
                            Memory Dump Source
                            • Source File: 00000000.00000002.292958564.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1840000_817260722.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 86ca7cdaefd01cb1b948d3c969091f841dee2bf5be7542ad8510f4805d01be08
                            • Instruction ID: 412875ab7c99f5a219b7e8cbf193f26bcd82c2c4af80936b373b0d41618f69fb
                            • Opcode Fuzzy Hash: 86ca7cdaefd01cb1b948d3c969091f841dee2bf5be7542ad8510f4805d01be08
                            • Instruction Fuzzy Hash: 4221F5B59002089FDB10CF9AD884ADEBFF8FB48324F14801AE955A3310D778A954CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2403 1849ca8-1849cf0 2404 1849cf2-1849cf5 2403->2404 2405 1849cf8-1849d27 LoadLibraryExW 2403->2405 2404->2405 2406 1849d30-1849d4d 2405->2406 2407 1849d29-1849d2f 2405->2407 2407->2406
                            APIs
                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01849B09,00000800,00000000,00000000), ref: 01849D1A
                            Memory Dump Source
                            • Source File: 00000000.00000002.292958564.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1840000_817260722.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: a633bd78f35be844a8decce67824fa2189b3bbbfca7cdd661fc3a9e7143b36eb
                            • Instruction ID: a0bb7be7ce76769e4c707b9f8eb163ef598ca29d9a6799964a17571796bc2ff3
                            • Opcode Fuzzy Hash: a633bd78f35be844a8decce67824fa2189b3bbbfca7cdd661fc3a9e7143b36eb
                            • Instruction Fuzzy Hash: AA1144B6D003088FDB10CFAAC485BDEFBF4AB48324F14842AE459B7600C778A645CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2410 1848b70-1849cf0 2412 1849cf2-1849cf5 2410->2412 2413 1849cf8-1849d27 LoadLibraryExW 2410->2413 2412->2413 2414 1849d30-1849d4d 2413->2414 2415 1849d29-1849d2f 2413->2415 2415->2414
                            APIs
                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01849B09,00000800,00000000,00000000), ref: 01849D1A
                            Memory Dump Source
                            • Source File: 00000000.00000002.292958564.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1840000_817260722.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: d08372788496933edf44f33cb56a65991442925c7aa262558f81e51887fdb52b
                            • Instruction ID: 351358d90eca2d81441deafcb29bf8f1b02ee3fd3cae7c2719e3ce9e45a0640b
                            • Opcode Fuzzy Hash: d08372788496933edf44f33cb56a65991442925c7aa262558f81e51887fdb52b
                            • Instruction Fuzzy Hash: D31106B6D002089FDB20CF9AC484BDEBBF4EB48324F14841AE915B7610C775A645CFA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2418 1849a28-1849a68 2419 1849a70-1849a9b GetModuleHandleW 2418->2419 2420 1849a6a-1849a6d 2418->2420 2421 1849aa4-1849ab8 2419->2421 2422 1849a9d-1849aa3 2419->2422 2420->2419 2422->2421
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000), ref: 01849A8E
                            Memory Dump Source
                            • Source File: 00000000.00000002.292958564.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1840000_817260722.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: f7f5ccaa72be8de87195cfc17232b60a6ae5ccd5caa1f2497fe8bb600a64ee27
                            • Instruction ID: 4757eb80fe72c39dee5ba0acd67939db6c359fcc058b5879547de7aa92f02c83
                            • Opcode Fuzzy Hash: f7f5ccaa72be8de87195cfc17232b60a6ae5ccd5caa1f2497fe8bb600a64ee27
                            • Instruction Fuzzy Hash: 1E11DFB6D002498FDB20CF9AC444BDEFBF4AB88328F14841AD51AA7610C779A645CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SetWindowLongW.USER32(?,?,?), ref: 055E05D5
                            Memory Dump Source
                            • Source File: 00000000.00000002.301687847.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_55e0000_817260722.jbxd
                            Similarity
                            • API ID: LongWindow
                            • String ID:
                            • API String ID: 1378638983-0
                            • Opcode ID: 0d9772448cc6004a89cee2fbacac251a30556e85c171fe2669af65da9e0a28a6
                            • Instruction ID: 62152b887a5bdb148a3f9f34320d0dfe483ed0e706098496bd4bad9dd85dd571
                            • Opcode Fuzzy Hash: 0d9772448cc6004a89cee2fbacac251a30556e85c171fe2669af65da9e0a28a6
                            • Instruction Fuzzy Hash: 7211FEB5800208CFDB10CF9AD589BDEBBF8FB48324F10851AE955A7751C379AA45CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SetWindowLongW.USER32(?,?,?), ref: 055E05D5
                            Memory Dump Source
                            • Source File: 00000000.00000002.301687847.00000000055E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_55e0000_817260722.jbxd
                            Similarity
                            • API ID: LongWindow
                            • String ID:
                            • API String ID: 1378638983-0
                            • Opcode ID: be57bf0650b7787e90ed94b5d728303b982a6ec395eb31a208a691d85ba34830
                            • Instruction ID: 9b80f013be023f977c4bcbfcd6b4a8768c77fde77b52f25418d9c4d22e39a7c8
                            • Opcode Fuzzy Hash: be57bf0650b7787e90ed94b5d728303b982a6ec395eb31a208a691d85ba34830
                            • Instruction Fuzzy Hash: 6911FEB58002088FDB10CF9AC489BDEBBF8EB48324F10841AE955A7750C378A945CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.292521982.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_154d000_817260722.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d7bc98d3482de4062e5ff5c3d09e7041f97e20e1ee886a466e18d8a32b06a0b6
                            • Instruction ID: 1b3e74f210cdcd98e7a59e2d8d08a4cf12456e6afe7d31432fbcd6ba5ed80532
                            • Opcode Fuzzy Hash: d7bc98d3482de4062e5ff5c3d09e7041f97e20e1ee886a466e18d8a32b06a0b6
                            • Instruction Fuzzy Hash: CA212872508240DFDF05CF94D9C4B2ABBB5FB98328F24C569E9051F646C336D816CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.292521982.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_154d000_817260722.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 03e95a449a09185bb4c072c5135127f4e7e2bbdbc28a63ac0f4263ee9d082e2d
                            • Instruction ID: 174f44614d2f5af48ead94c247535c13ed9184a117d741a969cbc44db734e1c2
                            • Opcode Fuzzy Hash: 03e95a449a09185bb4c072c5135127f4e7e2bbdbc28a63ac0f4263ee9d082e2d
                            • Instruction Fuzzy Hash: B82121B1500240EFDB01DF54D9C0BAABBB5FB9822CF208969E8050F606C736D816CAE1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.292554978.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_155d000_817260722.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d73f589ba0bd8de91c2e219184d8ba8a56e3a9d06e2f14e7799d9d601b9f4b1f
                            • Instruction ID: 6cb9ff178a29f613f5d0f432ccc51173b5d26eb4692955022c5bc3f9308b2cbe
                            • Opcode Fuzzy Hash: d73f589ba0bd8de91c2e219184d8ba8a56e3a9d06e2f14e7799d9d601b9f4b1f
                            • Instruction Fuzzy Hash: 3F210372504200EFDB41CF94C9D0B26BBB5FB84264F20C96EEC094F642C33AD846CA61
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.292554978.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_155d000_817260722.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2b9b0ce182c8ea4daa32652f4d489329d5826e3e81a1d27558d52c1cfa4755cf
                            • Instruction ID: 61c99fbcdb563a3e89ae6f4b4ba5c028abedb27a82a951f5f43894b925c50117
                            • Opcode Fuzzy Hash: 2b9b0ce182c8ea4daa32652f4d489329d5826e3e81a1d27558d52c1cfa4755cf
                            • Instruction Fuzzy Hash: 9A212176504200DFDB50CF54D9D0B2ABBB1FB84254F20C96ADC094F666D33AD806CAA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.292554978.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_155d000_817260722.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2306df4061301a830cec711e6efd30010e7509b445ede40679af3854551a66e6
                            • Instruction ID: 9a3ac66d5b3beb34d064a7e64efea52832afbaed6d04ee4a25f8aa56f9cd5c61
                            • Opcode Fuzzy Hash: 2306df4061301a830cec711e6efd30010e7509b445ede40679af3854551a66e6
                            • Instruction Fuzzy Hash: 4221AF754083809FCB02CF24D994B15BF71FB46214F28C5EAD8498F6A7D33A9806CB62
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.292521982.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_154d000_817260722.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b6e7c01bf4fe9c4208cc58f869901c3d969c6360483978ce6a185cd76ba03423
                            • Instruction ID: 4f5f70521e9f786f44a122e8c179577f06c6d3ef4def68c8d75f60e97d697784
                            • Opcode Fuzzy Hash: b6e7c01bf4fe9c4208cc58f869901c3d969c6360483978ce6a185cd76ba03423
                            • Instruction Fuzzy Hash: 7721AF76408280DFDB06CF54D9C4B5ABF71FB84324F24C6A9DD444B65AC33AD466CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.292521982.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_154d000_817260722.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 70e3174f8edcb6d955f2eaa729e5c8d0859060427c3956fb55596ee94f2e5266
                            • Instruction ID: 9cb98921c9366ce273fa5720b7a7c9d02e87b7a28cfe2b12bfd84891aa9eb2cb
                            • Opcode Fuzzy Hash: 70e3174f8edcb6d955f2eaa729e5c8d0859060427c3956fb55596ee94f2e5266
                            • Instruction Fuzzy Hash: BD11B176504280DFCB12CF54D5C4B5ABF71FB94328F24C6A9D8494F616C33AD456CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.292554978.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_155d000_817260722.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 54494137f3b6948219c904dba25a7ccfd033bc7a7c61b7e168f476f70a4b9db2
                            • Instruction ID: 7559e63be92517efb7065f9ea8c9c96f447caebbbd180386776e90087c36432a
                            • Opcode Fuzzy Hash: 54494137f3b6948219c904dba25a7ccfd033bc7a7c61b7e168f476f70a4b9db2
                            • Instruction Fuzzy Hash: 7A11BB76504280DFCB42CF54C6D0B19FBB1FB84224F28C6AEDC494B656C33AD84ACBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.292521982.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_154d000_817260722.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fbfcd90a3d407e63b4fdb6753af8b407773e6a85c6858b617942366ea1053497
                            • Instruction ID: 50bc1b5b6eb4c69b7db863a94133a566d6c518d47fdbcdb601bc05f0593604b0
                            • Opcode Fuzzy Hash: fbfcd90a3d407e63b4fdb6753af8b407773e6a85c6858b617942366ea1053497
                            • Instruction Fuzzy Hash: 5D01D4724083449BE7109B55C8847AABFF8FB51628F18845AEE481E643C3789844CAB1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.292521982.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_154d000_817260722.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 550a73cfdf6bd9a58ba9a4699a8f4a91954102c3fa9cc6c1bdc64d7917476758
                            • Instruction ID: d27acd4483163c433623b07b87095459f74564dc996166b9669f0e08e1e5875b
                            • Opcode Fuzzy Hash: 550a73cfdf6bd9a58ba9a4699a8f4a91954102c3fa9cc6c1bdc64d7917476758
                            • Instruction Fuzzy Hash: 01F0C2724042849FE7108A09CC84B66FFA8EB51738F18C45AEE085F682C3789844CAB1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.292958564.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1840000_817260722.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9b89aab14cec14344e9e9b5954ff2383712151170af4cc4815b2a97e388753a6
                            • Instruction ID: cbbb7d8b740af98b35276a20514492371460c307c553624242b4f7caca7f0ec2
                            • Opcode Fuzzy Hash: 9b89aab14cec14344e9e9b5954ff2383712151170af4cc4815b2a97e388753a6
                            • Instruction Fuzzy Hash: 6812C9F1CD17468AEB12CF66E4981893B61B741328BD04B0BD2611B6E1D7F811EECF48
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.292958564.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1840000_817260722.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dbdb8c838183e6af92ff935b8a46037c3eef7f00568b5a81be8583b840d3f070
                            • Instruction ID: a28ed0c0393753d608b7069f65212d6b412b7786b815a524f2a9638268453684
                            • Opcode Fuzzy Hash: dbdb8c838183e6af92ff935b8a46037c3eef7f00568b5a81be8583b840d3f070
                            • Instruction Fuzzy Hash: C4A17E32E0121A8FCF15DFA9C84459EBBB6FF95300B15856AE905EB261EF31AA45CB40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.292958564.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1840000_817260722.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 83ab44d87e958938cc22402986191e52bc067d9e27314dd8662b2ec1f7d836c5
                            • Instruction ID: 1382918d6c95ddaa8dee74cf591c06a6f1d2d737cc5492b3fb4454d7e69ad052
                            • Opcode Fuzzy Hash: 83ab44d87e958938cc22402986191e52bc067d9e27314dd8662b2ec1f7d836c5
                            • Instruction Fuzzy Hash: 4AC11BF1CD17468ADB12CF66E8981893B61BB45328FD04B0BD1612B6D0E7B815EACF58
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Execution Graph

                            Execution Coverage:15.9%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0.6%
                            Total number of Nodes:468
                            Total number of Limit Nodes:40
                            execution_graph 34946 76c72c8 34947 76c72e6 34946->34947 34950 76c6444 34947->34950 34949 76c731d 34951 76c90a0 LoadLibraryA 34950->34951 34953 76c917c 34951->34953 34437 66d33e8 34438 66d33f1 34437->34438 34442 66d3428 34438->34442 34447 66d3438 34438->34447 34439 66d3422 34443 66d3444 34442->34443 34452 66d3460 34443->34452 34457 66d3470 34443->34457 34444 66d3454 34444->34439 34448 66d343d 34447->34448 34450 66d3460 DnsQuery_A 34448->34450 34451 66d3470 DnsQuery_A 34448->34451 34449 66d3454 34449->34439 34450->34449 34451->34449 34454 66d348e 34452->34454 34453 66d34b6 34453->34444 34454->34453 34462 66d3569 34454->34462 34466 66d3578 34454->34466 34458 66d348e 34457->34458 34459 66d34b6 34458->34459 34460 66d3569 DnsQuery_A 34458->34460 34461 66d3578 DnsQuery_A 34458->34461 34459->34444 34460->34458 34461->34458 34463 66d35a1 34462->34463 34470 66d1adc 34463->34470 34467 66d35a1 34466->34467 34468 66d1adc DnsQuery_A 34467->34468 34469 66d35e2 34468->34469 34469->34454 34471 66d37f0 DnsQuery_A 34470->34471 34473 66d392a 34471->34473 34473->34473 34474 115b6d0 GetCurrentProcess 34475 115b743 34474->34475 34476 115b74a GetCurrentThread 34474->34476 34475->34476 34477 115b787 GetCurrentProcess 34476->34477 34478 115b780 34476->34478 34479 115b7bd 34477->34479 34478->34477 34480 115b7e5 GetCurrentThreadId 34479->34480 34481 115b816 34480->34481 34942 115bd00 DuplicateHandle 34943 115bd96 34942->34943 34944 115fe40 SetWindowLongW 34945 115feac 34944->34945 34954 66d6088 34955 66d60a2 34954->34955 34956 66d5010 2 API calls 34955->34956 34957 66d60e9 34956->34957 34482 76c22e0 34483 76c22f5 34482->34483 34489 76c23e8 34483->34489 34496 76c23f8 34483->34496 34484 76c234d 34503 76c2190 34484->34503 34490 76c240c 34489->34490 34494 76c23e8 GetSystemTimes 34489->34494 34495 76c23f8 GetSystemTimes 34489->34495 34492 76c2443 34490->34492 34507 76c1af0 34490->34507 34492->34484 34494->34490 34495->34490 34497 76c240c 34496->34497 34501 76c23e8 GetSystemTimes 34496->34501 34502 76c23f8 GetSystemTimes 34496->34502 34498 76c1af0 GetSystemTimes 34497->34498 34499 76c2443 34497->34499 34500 76c24a0 34498->34500 34499->34484 34500->34484 34501->34497 34502->34497 34504 76c219b 34503->34504 34511 76c21c0 34504->34511 34505 76c21a8 34508 76c2808 GetSystemTimes 34507->34508 34510 76c24a0 34508->34510 34510->34484 34512 76c221c 34511->34512 34514 76c21d3 34511->34514 34513 76c22be 34512->34513 34517 66d4ff1 34512->34517 34523 66d5010 34512->34523 34513->34505 34514->34505 34518 66d5005 34517->34518 34519 66d503a 34518->34519 34529 66d510f 34518->34529 34533 66d5120 34518->34533 34537 66d5277 34518->34537 34519->34513 34524 66d5023 34523->34524 34525 66d503a 34524->34525 34526 66d510f 2 API calls 34524->34526 34527 66d5277 2 API calls 34524->34527 34528 66d5120 2 API calls 34524->34528 34525->34513 34526->34525 34527->34525 34528->34525 34532 66d5113 34529->34532 34530 66d526f 34530->34519 34532->34530 34541 66d3ff8 34532->34541 34535 66d5137 34533->34535 34534 66d526f 34534->34519 34535->34534 34536 66d3ff8 2 API calls 34535->34536 34536->34534 34539 66d51b1 34537->34539 34538 66d526f 34538->34519 34539->34538 34540 66d3ff8 2 API calls 34539->34540 34540->34538 34542 66d4026 34541->34542 34546 66d4065 34541->34546 34543 66d4057 34542->34543 34544 66d406a 34542->34544 34545 66d40c2 34542->34545 34542->34546 34554 66d42e8 34543->34554 34562 66d42d8 34543->34562 34544->34546 34570 66d52e0 34544->34570 34582 66d52cf 34544->34582 34545->34546 34549 66d510f 2 API calls 34545->34549 34550 66d5277 2 API calls 34545->34550 34551 66d5120 2 API calls 34545->34551 34546->34530 34549->34546 34550->34546 34551->34546 34556 66d4310 34554->34556 34555 66d438a 34555->34546 34556->34555 34557 66d4380 34556->34557 34594 66d43c8 34556->34594 34606 66d43d8 34556->34606 34616 66d5288 34557->34616 34620 66d5298 34557->34620 34564 66d42de 34562->34564 34563 66d438a 34563->34546 34564->34563 34565 66d4380 34564->34565 34566 66d43c8 2 API calls 34564->34566 34567 66d43d8 2 API calls 34564->34567 34568 66d5288 2 API calls 34565->34568 34569 66d5298 2 API calls 34565->34569 34566->34565 34567->34565 34568->34563 34569->34563 34571 66d5301 34570->34571 34575 66d53b7 34570->34575 34572 66d530e 34571->34572 34574 66d53bc 34571->34574 34573 66d536e 34572->34573 34695 66d5520 34572->34695 34705 66d5530 34572->34705 34573->34575 34576 66d52cf 2 API calls 34573->34576 34577 66d52e0 2 API calls 34573->34577 34574->34575 34580 66d52cf 2 API calls 34574->34580 34581 66d52e0 2 API calls 34574->34581 34575->34545 34576->34575 34577->34575 34580->34575 34581->34575 34583 66d52d3 34582->34583 34584 66d53bc 34583->34584 34586 66d530e 34583->34586 34587 66d53b7 34583->34587 34584->34587 34588 66d52cf 2 API calls 34584->34588 34589 66d52e0 2 API calls 34584->34589 34585 66d536e 34585->34587 34590 66d52cf 2 API calls 34585->34590 34591 66d52e0 2 API calls 34585->34591 34586->34585 34592 66d5520 2 API calls 34586->34592 34593 66d5530 2 API calls 34586->34593 34587->34545 34588->34587 34589->34587 34590->34587 34591->34587 34592->34585 34593->34585 34595 66d43d6 34594->34595 34598 66d4393 34594->34598 34596 66d44ee 34595->34596 34599 66d43fc 34595->34599 34634 66d8e38 34596->34634 34643 66d9133 34596->34643 34651 66d9127 34596->34651 34659 66d8e28 34596->34659 34597 66d44b4 34597->34557 34598->34557 34624 66d4578 34599->34624 34629 66d4588 34599->34629 34607 66d44ee 34606->34607 34608 66d43fc 34606->34608 34612 66d8e28 2 API calls 34607->34612 34613 66d8e38 2 API calls 34607->34613 34614 66d9127 2 API calls 34607->34614 34615 66d9133 2 API calls 34607->34615 34610 66d4578 2 API calls 34608->34610 34611 66d4588 2 API calls 34608->34611 34609 66d44b4 34609->34557 34610->34609 34611->34609 34612->34609 34613->34609 34614->34609 34615->34609 34618 66d528b 34616->34618 34617 66d52c8 34617->34555 34618->34617 34619 66d3ff8 2 API calls 34618->34619 34619->34617 34622 66d52a0 34620->34622 34621 66d52c8 34621->34555 34622->34621 34623 66d3ff8 2 API calls 34622->34623 34623->34621 34625 66d45bc 34624->34625 34627 66d4ff1 2 API calls 34625->34627 34628 66d5010 2 API calls 34625->34628 34626 66d466a 34626->34597 34627->34626 34628->34626 34630 66d45bc 34629->34630 34632 66d4ff1 2 API calls 34630->34632 34633 66d5010 2 API calls 34630->34633 34631 66d466a 34631->34597 34632->34631 34633->34631 34636 66d8e4f 34634->34636 34635 66d8e69 34635->34597 34636->34635 34637 66d905c 34636->34637 34668 66d933d 34636->34668 34672 66d929a 34636->34672 34676 66d92a0 34636->34676 34638 66d915d 34637->34638 34680 66d8d18 34637->34680 34638->34597 34644 66d904c 34643->34644 34645 66d905c 34643->34645 34644->34645 34648 66d933d 2 API calls 34644->34648 34649 66d929a 2 API calls 34644->34649 34650 66d92a0 2 API calls 34644->34650 34646 66d8d18 2 API calls 34645->34646 34647 66d915d 34645->34647 34646->34645 34647->34597 34648->34645 34649->34645 34650->34645 34652 66d904c 34651->34652 34653 66d905c 34651->34653 34652->34653 34656 66d933d 2 API calls 34652->34656 34657 66d929a 2 API calls 34652->34657 34658 66d92a0 2 API calls 34652->34658 34654 66d8d18 2 API calls 34653->34654 34655 66d915d 34653->34655 34654->34653 34655->34597 34656->34653 34657->34653 34658->34653 34661 66d8e38 34659->34661 34660 66d8e69 34660->34597 34661->34660 34662 66d905c 34661->34662 34665 66d933d 2 API calls 34661->34665 34666 66d929a 2 API calls 34661->34666 34667 66d92a0 2 API calls 34661->34667 34663 66d915d 34662->34663 34664 66d8d18 2 API calls 34662->34664 34663->34597 34664->34662 34665->34662 34666->34662 34667->34662 34669 66d931a 34668->34669 34670 66d9382 34669->34670 34685 66d9700 34669->34685 34670->34637 34673 66d9382 34672->34673 34674 66d92ca 34672->34674 34673->34637 34674->34673 34675 66d9700 2 API calls 34674->34675 34675->34674 34677 66d9382 34676->34677 34678 66d92ca 34676->34678 34677->34637 34678->34677 34679 66d9700 2 API calls 34678->34679 34679->34678 34681 66d8d2a 34680->34681 34682 66d8d2e 34681->34682 34683 66d43c8 2 API calls 34681->34683 34684 66d43d8 2 API calls 34681->34684 34682->34637 34683->34682 34684->34682 34687 66d9705 34685->34687 34686 66d970b 34686->34669 34687->34686 34689 66d96fb GetCurrentThreadId GetCurrentThreadId 34687->34689 34690 66d973b GetCurrentThreadId GetCurrentThreadId 34687->34690 34691 76c2ee0 GetCurrentThreadId GetCurrentThreadId 34687->34691 34692 76c2ed0 GetCurrentThreadId GetCurrentThreadId 34687->34692 34693 66d9731 GetCurrentThreadId GetCurrentThreadId 34687->34693 34694 66d9740 GetCurrentThreadId GetCurrentThreadId 34687->34694 34688 66d9724 34688->34669 34689->34688 34690->34688 34691->34688 34692->34688 34693->34688 34694->34688 34696 66d5523 34695->34696 34697 66d558a 34696->34697 34698 66d558c 34696->34698 34699 66d5570 34696->34699 34697->34573 34723 66d567f 34698->34723 34735 66d55ea 34698->34735 34739 66d55f0 34698->34739 34715 66dfe50 34699->34715 34719 66dfe33 34699->34719 34706 66d5550 34705->34706 34707 66d558c 34706->34707 34708 66d5570 34706->34708 34709 66d558a 34706->34709 34712 66d567f 2 API calls 34707->34712 34713 66d55ea 2 API calls 34707->34713 34714 66d55f0 2 API calls 34707->34714 34710 66dfe50 2 API calls 34708->34710 34711 66dfe33 2 API calls 34708->34711 34709->34573 34710->34709 34711->34709 34712->34709 34713->34709 34714->34709 34716 66dfe5d 34715->34716 34717 66dfe6e 34715->34717 34716->34717 34718 66d92a0 2 API calls 34716->34718 34717->34697 34718->34717 34720 66dfe5d 34719->34720 34722 66dfe6e 34719->34722 34721 66d92a0 2 API calls 34720->34721 34720->34722 34721->34722 34722->34697 34724 66d560e 34723->34724 34725 66d5683 34723->34725 34724->34697 34727 66d569d 34725->34727 34729 66d56dd 34725->34729 34726 66d56da 34726->34697 34732 66d567f 2 API calls 34727->34732 34748 66d5758 34727->34748 34752 66d56f8 34727->34752 34728 66d570a 34728->34697 34729->34728 34730 66d5010 2 API calls 34729->34730 34731 66d57fb 34730->34731 34731->34697 34732->34726 34736 66d5603 34735->34736 34738 66d567f 2 API calls 34736->34738 34737 66d560c 34737->34697 34738->34737 34740 66d560c 34739->34740 34741 66d55fc 34739->34741 34740->34697 34741->34740 34742 66d5619 34741->34742 34743 66d5603 34741->34743 34758 66d5820 34742->34758 34762 66d5812 34742->34762 34766 66d5c38 34742->34766 34747 66d567f 2 API calls 34743->34747 34747->34740 34749 66d575b 34748->34749 34750 66d5010 2 API calls 34749->34750 34751 66d57fb 34750->34751 34751->34726 34753 66d570a 34752->34753 34755 66d5711 34752->34755 34753->34726 34754 66d5733 34754->34726 34755->34754 34756 66d5010 2 API calls 34755->34756 34757 66d57fb 34756->34757 34757->34726 34759 66d584c 34758->34759 34760 66d56f8 2 API calls 34759->34760 34761 66d5ab1 34759->34761 34760->34759 34761->34740 34764 66d5816 34762->34764 34763 66d5ab1 34763->34740 34764->34763 34765 66d56f8 2 API calls 34764->34765 34765->34764 34768 66d5c44 34766->34768 34767 66d5c4d 34767->34740 34768->34767 34769 66d5010 2 API calls 34768->34769 34769->34767 34770 76c3b21 34771 76c3aff 34770->34771 34772 76c3b5f 34771->34772 34775 76c3bdb 34771->34775 34780 76c3bc0 34771->34780 34776 76c3bd2 34775->34776 34777 76c3bda 34776->34777 34784 76c3bf0 34776->34784 34794 76c3be1 34776->34794 34777->34771 34782 76c3bf0 2 API calls 34780->34782 34783 76c3be1 2 API calls 34780->34783 34781 76c3bda 34781->34771 34782->34781 34783->34781 34785 76c3bf8 34784->34785 34786 76c3c11 34785->34786 34790 76c3c21 34785->34790 34805 76c30b8 34786->34805 34789 76c3c1f 34789->34777 34790->34789 34819 76c3178 GetCurrentThreadId GetCurrentThreadId 34790->34819 34795 76c3c29 34794->34795 34796 76c3bef 34794->34796 34795->34777 34797 76c3c11 34796->34797 34801 76c3c21 34796->34801 34798 76c30b8 2 API calls 34797->34798 34799 76c3c1a 34798->34799 34803 66d10f8 2 API calls 34799->34803 34804 66d1108 2 API calls 34799->34804 34800 76c3c1f 34800->34777 34801->34800 34844 76c3178 GetCurrentThreadId GetCurrentThreadId 34801->34844 34803->34800 34804->34800 34806 76c30cc 34805->34806 34820 76c3148 34806->34820 34809 66d1108 34810 66d1118 34809->34810 34811 66d1185 34810->34811 34824 66d13c9 34810->34824 34830 66d13d8 34810->34830 34811->34789 34814 66d10f8 34815 66d1109 34814->34815 34816 66d13c9 2 API calls 34815->34816 34817 66d13d8 2 API calls 34815->34817 34818 66d1185 34815->34818 34816->34818 34817->34818 34818->34789 34819->34789 34821 76c3153 34820->34821 34823 76c21c0 2 API calls 34821->34823 34822 76c3130 34822->34809 34822->34814 34823->34822 34825 66d142f 34824->34825 34827 66d13e8 34824->34827 34836 66d14a1 34825->34836 34840 66d14b0 34825->34840 34826 66d143c 34826->34811 34827->34811 34831 66d142f 34830->34831 34833 66d13e8 34830->34833 34834 66d14a1 GetCurrentThreadId 34831->34834 34835 66d14b0 GetCurrentThreadId 34831->34835 34832 66d143c 34832->34811 34833->34811 34834->34832 34835->34832 34837 66d1503 34836->34837 34838 66d156f GetCurrentThreadId 34837->34838 34839 66d153f 34837->34839 34838->34839 34839->34839 34841 66d1503 34840->34841 34842 66d156f GetCurrentThreadId 34841->34842 34843 66d153f 34841->34843 34842->34843 34843->34843 34844->34800 34845 1156758 34848 1156344 34845->34848 34847 1156766 34849 115634f 34848->34849 34852 1156394 34849->34852 34851 115688d 34851->34847 34853 115639f 34852->34853 34856 11563c4 34853->34856 34855 1156962 34855->34851 34857 11563cf 34856->34857 34860 11563f4 34857->34860 34859 1156a62 34859->34855 34861 11563ff 34860->34861 34863 115717e 34861->34863 34866 11592b9 34861->34866 34862 11571bc 34862->34859 34863->34862 34870 115b3f9 34863->34870 34875 11592e1 34866->34875 34879 11592f0 34866->34879 34867 11592ce 34867->34863 34872 115b429 34870->34872 34871 115b44d 34871->34862 34872->34871 34902 115b5b8 34872->34902 34906 115b5ab 34872->34906 34876 11592f0 34875->34876 34882 11593e8 34876->34882 34877 11592ff 34877->34867 34881 11593e8 2 API calls 34879->34881 34880 11592ff 34880->34867 34881->34880 34883 11593fb 34882->34883 34884 1159413 34883->34884 34890 1159670 34883->34890 34894 1159660 34883->34894 34884->34877 34885 1159610 GetModuleHandleW 34887 115963d 34885->34887 34886 115940b 34886->34884 34886->34885 34887->34877 34891 1159684 34890->34891 34892 11596a9 34891->34892 34898 1158768 34891->34898 34892->34886 34895 1159670 34894->34895 34896 1158768 LoadLibraryExW 34895->34896 34897 11596a9 34895->34897 34896->34897 34897->34886 34899 1159850 LoadLibraryExW 34898->34899 34901 11598c9 34899->34901 34901->34892 34904 115b5c5 34902->34904 34903 115b5ff 34903->34871 34904->34903 34910 115a0ec 34904->34910 34907 115b5b2 34906->34907 34908 115b5ff 34907->34908 34909 115a0ec 5 API calls 34907->34909 34908->34871 34909->34908 34911 115a0f7 34910->34911 34913 115c2f8 34911->34913 34914 115b904 34911->34914 34913->34913 34915 115b90f 34914->34915 34916 11563f4 5 API calls 34915->34916 34917 115c367 34916->34917 34926 115c3e0 34917->34926 34932 115c3d3 34917->34932 34918 115c375 34919 115b914 LoadLibraryExW GetModuleHandleW 34918->34919 34920 115c38f 34919->34920 34922 115e0f0 LoadLibraryExW GetModuleHandleW 34920->34922 34923 115e0d8 LoadLibraryExW GetModuleHandleW 34920->34923 34921 115c3a0 34921->34913 34922->34921 34923->34921 34927 115c40e 34926->34927 34929 115c437 34927->34929 34931 115c4df 34927->34931 34938 115b9a0 34927->34938 34930 115c4da KiUserCallbackDispatcher 34929->34930 34929->34931 34930->34931 34933 115c3e0 34932->34933 34934 115b9a0 GetFocus 34933->34934 34935 115c437 34933->34935 34937 115c4df 34933->34937 34934->34935 34936 115c4da KiUserCallbackDispatcher 34935->34936 34935->34937 34936->34937 34939 115b9ab 34938->34939 34940 115ba14 GetFocus 34939->34940 34941 115c9f5 34940->34941 34941->34929 34958 115fbf8 34959 115fc60 CreateWindowExW 34958->34959 34961 115fd1c 34959->34961 34961->34961 34962 66d7b10 34963 66d7b17 34962->34963 34966 66d7c13 34963->34966 34967 66d7c26 34966->34967 34971 66d7dd9 34967->34971 34976 66d7de8 34967->34976 34972 66d7de8 34971->34972 34981 66d8238 34972->34981 34987 66d8460 34972->34987 34977 66d7df9 34976->34977 34979 66d8238 2 API calls 34977->34979 34980 66d8460 2 API calls 34977->34980 34978 66d7b21 34979->34978 34980->34978 34982 66d8262 34981->34982 34983 66d8288 34982->34983 34993 66d8b70 34982->34993 34998 66d93bb 34982->34998 35002 66d947e 34982->35002 34989 66d8271 34987->34989 34988 66d8288 34989->34988 34990 66d947e 2 API calls 34989->34990 34991 66d93bb 2 API calls 34989->34991 34992 66d8b70 2 API calls 34989->34992 34990->34989 34991->34989 34992->34989 34995 66d8b88 34993->34995 34994 66d8baf 34994->34982 34995->34994 35006 66d8cdf 34995->35006 34999 66d93da 34998->34999 35000 66d93fd 34999->35000 35001 66d8e38 2 API calls 34999->35001 35000->34982 35000->35000 35001->35000 35003 66d9488 35002->35003 35004 66d8e38 2 API calls 35003->35004 35005 66d96ae 35003->35005 35004->35005 35005->35005 35007 66d8cf1 35006->35007 35009 66d8e28 2 API calls 35007->35009 35010 66d8e38 2 API calls 35007->35010 35008 66d8cbc 35008->34982 35009->35008 35010->35008

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 992 76c1af0-76c2891 GetSystemTimes 995 76c289a-76c28bb 992->995 996 76c2893-76c2899 992->996 996->995
                            APIs
                            • GetSystemTimes.KERNELBASE(?,?,?), ref: 076C2884
                            Memory Dump Source
                            • Source File: 00000004.00000002.546824288.00000000076C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_76c0000_817260722.jbxd
                            Similarity
                            • API ID: SystemTimes
                            • String ID:
                            • API String ID: 375623090-0
                            • Opcode ID: 0967cabbaed819c30ec70b5c3ab98ea22f4396eb83a8d65714a714de9ffb0878
                            • Instruction ID: 48dd6ebde66985b4b4977eff2b40073db36934a13a4e61a4ab3d087ea0821dc0
                            • Opcode Fuzzy Hash: 0967cabbaed819c30ec70b5c3ab98ea22f4396eb83a8d65714a714de9ffb0878
                            • Instruction Fuzzy Hash: C521C4B1D022199FCB40DF99D5847DEBBF4FB48210F14806AE908E7351D7789945CBA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000004.00000002.543131349.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_66d0000_817260722.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 382253199fcbaab99779330e821cd9073d5fc60fc8b653631c7cef363e057230
                            • Instruction ID: 38af2e5b4bf4bb4108727f2037d894696b46fd3de9f4ed33ee5c0405611d7ce8
                            • Opcode Fuzzy Hash: 382253199fcbaab99779330e821cd9073d5fc60fc8b653631c7cef363e057230
                            • Instruction Fuzzy Hash: 8A41A178E012089FDB44DFA5E995AAEBFB2FB49300F14802AE805B73A4DB355945CF60
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 0115B730
                            • GetCurrentThread.KERNEL32 ref: 0115B76D
                            • GetCurrentProcess.KERNEL32 ref: 0115B7AA
                            • GetCurrentThreadId.KERNEL32 ref: 0115B803
                            Memory Dump Source
                            • Source File: 00000004.00000002.520148360.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_1150000_817260722.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: 5b1017a9bef52092d06e232ce195cceb13ca730320673873df50151495da2f80
                            • Instruction ID: 41e5bcfd7c406aaac560c0a9e5c9ea1bfac7e4927986e1206ab4d13c01f917ca
                            • Opcode Fuzzy Hash: 5b1017a9bef52092d06e232ce195cceb13ca730320673873df50151495da2f80
                            • Instruction Fuzzy Hash: 5F5174B09016489FDB44CFAAD6887DEBBF1AB48314F24845AE419B77A0C734A844CB65
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 0115B730
                            • GetCurrentThread.KERNEL32 ref: 0115B76D
                            • GetCurrentProcess.KERNEL32 ref: 0115B7AA
                            • GetCurrentThreadId.KERNEL32 ref: 0115B803
                            Memory Dump Source
                            • Source File: 00000004.00000002.520148360.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_1150000_817260722.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: 4fd3cfdc970967f5f0ee0865aa370b68bcb0c5fac1e05a62ae74a3711ff35336
                            • Instruction ID: 6f4a73a070c77d1ddebd96c07d334969a9dc86d8f58a7635e073cfe8c5097247
                            • Opcode Fuzzy Hash: 4fd3cfdc970967f5f0ee0865aa370b68bcb0c5fac1e05a62ae74a3711ff35336
                            • Instruction Fuzzy Hash: DD5165B0A01608DFDB54CFAAD688BDEBBF1AF48314F248459E419B77A0D734A844CF65
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 114 66d3738-66d3754 115 66d376a-66d37cb 114->115 116 66d3756-66d3767 114->116 125 66d37d9-66d3863 115->125 126 66d37a8-66d37d7 115->126 131 66d389c-66d38cf 125->131 132 66d3865-66d386f 125->132 142 66d38d7-66d3928 DnsQuery_A 131->142 132->131 134 66d3871-66d3873 132->134 135 66d3875-66d387f 134->135 136 66d3896-66d3899 134->136 139 66d3881 135->139 140 66d3883-66d3892 135->140 136->131 139->140 140->140 141 66d3894 140->141 141->136 143 66d392a-66d3930 142->143 144 66d3931-66d397e 142->144 143->144 149 66d398e-66d3992 144->149 150 66d3980-66d3984 144->150 152 66d3994-66d3997 149->152 153 66d39a1-66d39a5 149->153 150->149 151 66d3986 150->151 151->149 152->153 154 66d39a7-66d39b3 153->154 155 66d39b6 153->155 154->155 156 66d39b7 155->156 156->156
                            Memory Dump Source
                            • Source File: 00000004.00000002.543131349.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_66d0000_817260722.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bc51a60f594e22b21ef682ebc1f51c3222f7eb3686052cc910088c612fcfc867
                            • Instruction ID: 14ee36b6b37338ebfb6f3fa1893dd83e179119ef74b3552bf3fa462a1a723b76
                            • Opcode Fuzzy Hash: bc51a60f594e22b21ef682ebc1f51c3222f7eb3686052cc910088c612fcfc867
                            • Instruction Fuzzy Hash: 568149B1D00209DFDB54DFA9C8806DEBBB1FF49314F14852AD415BB350EB74A94ACB92
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 158 11593e8-11593fd call 1158704 161 1159413-1159417 158->161 162 11593ff 158->162 163 1159419-1159423 161->163 164 115942b-115946c 161->164 212 1159405 call 1159670 162->212 213 1159405 call 1159660 162->213 163->164 169 115946e-1159476 164->169 170 1159479-1159487 164->170 165 115940b-115940d 165->161 167 1159548-1159608 165->167 207 1159610-115963b GetModuleHandleW 167->207 208 115960a-115960d 167->208 169->170 172 1159489-115948e 170->172 173 11594ab-11594ad 170->173 174 1159490-1159497 call 1158710 172->174 175 1159499 172->175 176 11594b0-11594b7 173->176 179 115949b-11594a9 174->179 175->179 180 11594c4-11594cb 176->180 181 11594b9-11594c1 176->181 179->176 183 11594cd-11594d5 180->183 184 11594d8-11594e1 call 1158720 180->184 181->180 183->184 188 11594e3-11594eb 184->188 189 11594ee-11594f3 184->189 188->189 191 11594f5-11594fc 189->191 192 1159511-1159515 189->192 191->192 193 11594fe-115950e call 1158730 call 1158740 191->193 214 1159518 call 1159958 192->214 215 1159518 call 1159968 192->215 193->192 196 115951b-115951e 199 1159541-1159547 196->199 200 1159520-115953e 196->200 200->199 209 1159644-1159658 207->209 210 115963d-1159643 207->210 208->207 210->209 212->165 213->165 214->196 215->196
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0115962E
                            Memory Dump Source
                            • Source File: 00000004.00000002.520148360.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_1150000_817260722.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: c1b33b442a32184c92379cb921118b7e9f33de42c8001b6045dba064fbffbaa2
                            • Instruction ID: 614a525a34814ec091af007e8c604afd3a1ce0cc2d216199dbaf34b77cca180e
                            • Opcode Fuzzy Hash: c1b33b442a32184c92379cb921118b7e9f33de42c8001b6045dba064fbffbaa2
                            • Instruction Fuzzy Hash: 60711770A00B05CFD768DF2AD54175ABBF5BF48218F00892DD89AD7B50D775E809CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 216 66d37e4-66d3863 218 66d389c-66d38cf 216->218 219 66d3865-66d386f 216->219 227 66d38d7-66d3928 DnsQuery_A 218->227 219->218 220 66d3871-66d3873 219->220 221 66d3875-66d387f 220->221 222 66d3896-66d3899 220->222 224 66d3881 221->224 225 66d3883-66d3892 221->225 222->218 224->225 225->225 226 66d3894 225->226 226->222 228 66d392a-66d3930 227->228 229 66d3931-66d397e 227->229 228->229 234 66d398e-66d3992 229->234 235 66d3980-66d3984 229->235 237 66d3994-66d3997 234->237 238 66d39a1-66d39a5 234->238 235->234 236 66d3986 235->236 236->234 237->238 239 66d39a7-66d39b3 238->239 240 66d39b6 238->240 239->240 241 66d39b7 240->241 241->241
                            APIs
                            • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 066D3918
                            Memory Dump Source
                            • Source File: 00000004.00000002.543131349.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_66d0000_817260722.jbxd
                            Similarity
                            • API ID: Query_
                            • String ID:
                            • API String ID: 428220571-0
                            • Opcode ID: 08f13fe451084e461bcc67a27a76bd69f5cbd76d2e18caab37f7ccf91a2a02ca
                            • Instruction ID: ce4b3ea5bf68f5bc551a1fb5514ac72b7eb76a64527991b07638378cc845b8d7
                            • Opcode Fuzzy Hash: 08f13fe451084e461bcc67a27a76bd69f5cbd76d2e18caab37f7ccf91a2a02ca
                            • Instruction Fuzzy Hash: 7E5132B1D002199FDB54CFA9C8806DEBBB1FF49314F24812AE818BB354DB749946CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 243 66d1adc-66d3863 246 66d389c-66d3928 DnsQuery_A 243->246 247 66d3865-66d386f 243->247 256 66d392a-66d3930 246->256 257 66d3931-66d397e 246->257 247->246 248 66d3871-66d3873 247->248 249 66d3875-66d387f 248->249 250 66d3896-66d3899 248->250 252 66d3881 249->252 253 66d3883-66d3892 249->253 250->246 252->253 253->253 254 66d3894 253->254 254->250 256->257 262 66d398e-66d3992 257->262 263 66d3980-66d3984 257->263 265 66d3994-66d3997 262->265 266 66d39a1-66d39a5 262->266 263->262 264 66d3986 263->264 264->262 265->266 267 66d39a7-66d39b3 266->267 268 66d39b6 266->268 267->268 269 66d39b7 268->269 269->269
                            APIs
                            • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 066D3918
                            Memory Dump Source
                            • Source File: 00000004.00000002.543131349.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_66d0000_817260722.jbxd
                            Similarity
                            • API ID: Query_
                            • String ID:
                            • API String ID: 428220571-0
                            • Opcode ID: 3d9fe6cc687be8bd10c659cf9811358904aa28608ddf9dac8bcd263f72c90b93
                            • Instruction ID: 34bb2e0441926b2c0f93cbb378fc2805ec2d886200bd556c25f5c6e1a77bb6de
                            • Opcode Fuzzy Hash: 3d9fe6cc687be8bd10c659cf9811358904aa28608ddf9dac8bcd263f72c90b93
                            • Instruction Fuzzy Hash: ED5123B1D002199FDB54CFA9C8806DEBBB1FF49314F24812AE815BB354DB74A946CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 271 115fb81-115fb88 272 115fbec-115fc5e 271->272 273 115fb8a-115fb93 271->273 274 115fc60-115fc66 272->274 275 115fc69-115fc70 272->275 274->275 276 115fc72-115fc78 275->276 277 115fc7b-115fcb3 275->277 276->277 278 115fcbb-115fd1a CreateWindowExW 277->278 279 115fd23-115fd5b 278->279 280 115fd1c-115fd22 278->280 284 115fd5d-115fd60 279->284 285 115fd68 279->285 280->279 284->285 286 115fd69 285->286 286->286
                            APIs
                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0115FD0A
                            Memory Dump Source
                            • Source File: 00000004.00000002.520148360.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_1150000_817260722.jbxd
                            Similarity
                            • API ID: CreateWindow
                            • String ID:
                            • API String ID: 716092398-0
                            • Opcode ID: b74607e03dae76448fe52031ae87145c91491d305410725b5ed9d73c8150bcd2
                            • Instruction ID: 93f0c3bca8910acac4f49dad98e68d2eedc53846ea1cf54d2fcb8f2d1661ef0e
                            • Opcode Fuzzy Hash: b74607e03dae76448fe52031ae87145c91491d305410725b5ed9d73c8150bcd2
                            • Instruction Fuzzy Hash: 5951B2B1D00349DFDB14CFA9D884ADDBBB1BF49314F24852AE815AB210D775A945CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 287 115fbf8-115fc5e 288 115fc60-115fc66 287->288 289 115fc69-115fc70 287->289 288->289 290 115fc72-115fc78 289->290 291 115fc7b-115fd1a CreateWindowExW 289->291 290->291 293 115fd23-115fd5b 291->293 294 115fd1c-115fd22 291->294 298 115fd5d-115fd60 293->298 299 115fd68 293->299 294->293 298->299 300 115fd69 299->300 300->300
                            APIs
                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0115FD0A
                            Memory Dump Source
                            • Source File: 00000004.00000002.520148360.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_1150000_817260722.jbxd
                            Similarity
                            • API ID: CreateWindow
                            • String ID:
                            • API String ID: 716092398-0
                            • Opcode ID: 5c0d921ad9db7ef9baf10c3db220be3bc7018c13a23f9166bde76b8c3814a529
                            • Instruction ID: 662946d7695b445a5b57925d5edda615d60eb7a7fd48100ba51f0638a5a57a20
                            • Opcode Fuzzy Hash: 5c0d921ad9db7ef9baf10c3db220be3bc7018c13a23f9166bde76b8c3814a529
                            • Instruction Fuzzy Hash: F041A2B1D10309DFDF14CF9AD884ADEBBB5BF48314F24812AE819AB214D775A945CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 301 66d14b0-66d151c 305 66d151e-66d1527 301->305 306 66d1529-66d153d 301->306 309 66d1565-66d1567 305->309 312 66d153f-66d1557 306->312 313 66d1559-66d1563 306->313 311 66d156f-66d159d GetCurrentThreadId 309->311 314 66d159f-66d15a5 311->314 315 66d15a6-66d15cb 311->315 316 66d15cd-66d15d1 312->316 313->309 314->315 315->316 318 66d15dc 316->318 319 66d15d3 316->319 321 66d15dd 318->321 319->318 321->321
                            APIs
                            • GetCurrentThreadId.KERNEL32 ref: 066D1589
                            Memory Dump Source
                            • Source File: 00000004.00000002.543131349.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_66d0000_817260722.jbxd
                            Similarity
                            • API ID: CurrentThread
                            • String ID:
                            • API String ID: 2882836952-0
                            • Opcode ID: bfd0d26a1544c36517e588a085e78b86b21e7b0c8aa4e9c5aaad027c66a76db0
                            • Instruction ID: 8b0f77ba47ae7a7b01410b90e0dab1cfe7460445f833435e66af2b9f200754fc
                            • Opcode Fuzzy Hash: bfd0d26a1544c36517e588a085e78b86b21e7b0c8aa4e9c5aaad027c66a76db0
                            • Instruction Fuzzy Hash: 853138B0E00218DFDB54DFA9D484BADBBF5AF49714F14805AE406E7351CBB89946CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 322 76c6444-76c90f7 324 76c90f9-76c9103 322->324 325 76c9130-76c917a LoadLibraryA 322->325 324->325 326 76c9105-76c9107 324->326 330 76c917c-76c9182 325->330 331 76c9183-76c91b4 325->331 327 76c9109-76c9113 326->327 328 76c912a-76c912d 326->328 332 76c9115 327->332 333 76c9117-76c9126 327->333 328->325 330->331 337 76c91c4 331->337 338 76c91b6-76c91ba 331->338 332->333 333->333 335 76c9128 333->335 335->328 338->337 339 76c91bc 338->339 339->337
                            APIs
                            • LoadLibraryA.KERNELBASE(?), ref: 076C916A
                            Memory Dump Source
                            • Source File: 00000004.00000002.546824288.00000000076C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_76c0000_817260722.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: b13443b8df83fcbf1770af096022bfa7ed03a8943e804de98a107a71fadf809e
                            • Instruction ID: ccdad58f49e0244728fa1f3d904ab47b26dc488a6a9a1e1ae677754d24227835
                            • Opcode Fuzzy Hash: b13443b8df83fcbf1770af096022bfa7ed03a8943e804de98a107a71fadf809e
                            • Instruction Fuzzy Hash: F03133B0D10749DFDB14DFA9C88A7AEBBF1EB09714F10812EE816A7780D774A841CB95
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 960 66d14a1-66d151c 964 66d151e-66d1527 960->964 965 66d1529-66d153d 960->965 968 66d1565-66d1567 964->968 971 66d153f-66d1557 965->971 972 66d1559-66d1563 965->972 970 66d156f-66d159d GetCurrentThreadId 968->970 973 66d159f-66d15a5 970->973 974 66d15a6-66d15cb 970->974 975 66d15cd-66d15d1 971->975 972->968 973->974 974->975 977 66d15dc 975->977 978 66d15d3 975->978 980 66d15dd 977->980 978->977 980->980
                            APIs
                            • GetCurrentThreadId.KERNEL32 ref: 066D1589
                            Memory Dump Source
                            • Source File: 00000004.00000002.543131349.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_66d0000_817260722.jbxd
                            Similarity
                            • API ID: CurrentThread
                            • String ID:
                            • API String ID: 2882836952-0
                            • Opcode ID: 33d8d17b2d385ad990cea61cb0a4518b6c0c35a985ee2322c9f6c4948bb87b95
                            • Instruction ID: dcee7fd9ebdf8a7f3d2b195ab0325e08bcbdfc6fb8dff047a9d441a71319ebd8
                            • Opcode Fuzzy Hash: 33d8d17b2d385ad990cea61cb0a4518b6c0c35a985ee2322c9f6c4948bb87b95
                            • Instruction Fuzzy Hash: EF3178B1D002189FCBA4DFA9E488BEDBBF1AB09710F14841AE406E7390CB749946CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 981 115bcf9-115bcfb 982 115bd00-115bd94 DuplicateHandle 981->982 983 115bd96-115bd9c 982->983 984 115bd9d-115bdba 982->984 983->984
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0115BD87
                            Memory Dump Source
                            • Source File: 00000004.00000002.520148360.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_1150000_817260722.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 2bd94cd44b532a4d709d9f84b8aa2cdf04b569ce50b53314b1cf2ced8b447869
                            • Instruction ID: d568b31d608c1b218ea3a89286f6af759414a2a6a083478013df14257c3fe03d
                            • Opcode Fuzzy Hash: 2bd94cd44b532a4d709d9f84b8aa2cdf04b569ce50b53314b1cf2ced8b447869
                            • Instruction Fuzzy Hash: 6221E6B5900259DFDB10CF9AD584AEEBFF5EB48324F14841AE954B3310C374A944CFA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 987 115bd00-115bd94 DuplicateHandle 988 115bd96-115bd9c 987->988 989 115bd9d-115bdba 987->989 988->989
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0115BD87
                            Memory Dump Source
                            • Source File: 00000004.00000002.520148360.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_1150000_817260722.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 8b1348383d929911da66ae118470cc2d37ccc779d1e5fe3e7182c648da13938a
                            • Instruction ID: 5d2f3229e41245f916ce674ed41f303c102d57152665384ad5321fe123d9a4e1
                            • Opcode Fuzzy Hash: 8b1348383d929911da66ae118470cc2d37ccc779d1e5fe3e7182c648da13938a
                            • Instruction Fuzzy Hash: 8721C4B5901209DFDB10CF9AD584ADEBBF5EB48324F14841AE958B3710D378A944CFA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,011596A9,00000800,00000000,00000000), ref: 011598BA
                            Memory Dump Source
                            • Source File: 00000004.00000002.520148360.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_1150000_817260722.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: 2867dcb0d178b3f96f75ac551d25baef2719e2168edaeb28ed3ec8cf4d8e5f6a
                            • Instruction ID: 984fe848c435d6afde8a57415d8c6c6e121bcdb3f7633f00f0367d80e7ad8bb6
                            • Opcode Fuzzy Hash: 2867dcb0d178b3f96f75ac551d25baef2719e2168edaeb28ed3ec8cf4d8e5f6a
                            • Instruction Fuzzy Hash: E311C2B6900209DFDB14CF9AD444ADEBBF4AB48324F14842EE929B7710C375A945CFA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,011596A9,00000800,00000000,00000000), ref: 011598BA
                            Memory Dump Source
                            • Source File: 00000004.00000002.520148360.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_1150000_817260722.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: adbd03f4be1b9540593edf5fe09217a19116e4a385681c3c95cf5d0148239491
                            • Instruction ID: 6e1ef6e51aa68392c94de1cd9c152a7f3ef28d34caa0b80a0fd37ac71b6384e5
                            • Opcode Fuzzy Hash: adbd03f4be1b9540593edf5fe09217a19116e4a385681c3c95cf5d0148239491
                            • Instruction Fuzzy Hash: 0A1103B6900209CFDB14CF9AD484ADEBBF4AB49324F14842EE825B7610C379A545CFA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0115962E
                            Memory Dump Source
                            • Source File: 00000004.00000002.520148360.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_1150000_817260722.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: edc6de6fce8406b34e58e89677c6e4d926c63c97534c2e674abe775769b92d2b
                            • Instruction ID: f2ab6bd58c77ecaf906ef3171240b8cf038d1f13f3a1d84dfe50486b27cb790a
                            • Opcode Fuzzy Hash: edc6de6fce8406b34e58e89677c6e4d926c63c97534c2e674abe775769b92d2b
                            • Instruction Fuzzy Hash: 621113B1C00609CFDB14CF9AC444BDEFBF4AB48224F10841AD829B7610C375A549CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SetWindowLongW.USER32(?,?,?), ref: 0115FE9D
                            Memory Dump Source
                            • Source File: 00000004.00000002.520148360.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_1150000_817260722.jbxd
                            Similarity
                            • API ID: LongWindow
                            • String ID:
                            • API String ID: 1378638983-0
                            • Opcode ID: dfe1e929dc213bd07a515ecb57752162e1cc102b9cb1da41bc9b4aa23a01659f
                            • Instruction ID: 893e4da56af979d5057ba57581f1fb3e13e85d7e841554ef871846e784284924
                            • Opcode Fuzzy Hash: dfe1e929dc213bd07a515ecb57752162e1cc102b9cb1da41bc9b4aa23a01659f
                            • Instruction Fuzzy Hash: CC1122B18002499FDB10CF9AD585BDEBFF8EB48724F10840AE858B7701C374A944CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SetWindowLongW.USER32(?,?,?), ref: 0115FE9D
                            Memory Dump Source
                            • Source File: 00000004.00000002.520148360.0000000001150000.00000040.00000800.00020000.00000000.sdmp, Offset: 01150000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_1150000_817260722.jbxd
                            Similarity
                            • API ID: LongWindow
                            • String ID:
                            • API String ID: 1378638983-0
                            • Opcode ID: e0d63503ea626b326cdd3d59658d72c2318bbbf79c204e9334d25b280124a9b0
                            • Instruction ID: cd951c566da0043425da5ea47ae1921a1c2bc133a3d06a40b1c44184b0479a70
                            • Opcode Fuzzy Hash: e0d63503ea626b326cdd3d59658d72c2318bbbf79c204e9334d25b280124a9b0
                            • Instruction Fuzzy Hash: F01112B5800209CFDB10DF9AD585BDEBBF8EB48724F10841AE965B3700C374A944CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000004.00000002.546824288.00000000076C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_76c0000_817260722.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2ff00aef57330715f0b01de2697b21fd6e23a390fc133a9687d3b71f10aceb25
                            • Instruction ID: 427aac7e1264ce8d81c0519a9d89b9a9b5bedc629e3a2f3d51aa8ca1b464f619
                            • Opcode Fuzzy Hash: 2ff00aef57330715f0b01de2697b21fd6e23a390fc133a9687d3b71f10aceb25
                            • Instruction Fuzzy Hash: E4017171D012149FC7189FA6E8187FDBAB5EB4E222F045429D515B36D0DB744444CB69
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000004.00000002.546824288.00000000076C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_4_2_76c0000_817260722.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 82269a497ca0554937a0ca28a353461aa6fdb2d830ed68f66bfde90d7372d7e2
                            • Instruction ID: b1ad855f1e60c4d6ce5a1e4f63f1737150a98bac8f12121a3ec1f37b690ad340
                            • Opcode Fuzzy Hash: 82269a497ca0554937a0ca28a353461aa6fdb2d830ed68f66bfde90d7372d7e2
                            • Instruction Fuzzy Hash: 35F08171D012189FCB18DFAAE4187FDBBF5EB8E312F04902AD505B3290DB744444CB68
                            Uniqueness

                            Uniqueness Score: -1.00%