Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10NanoCore-m...in.dll
windows10-2004-x64
1NanoCore-m...ib.dll
windows10-2004-x64
1NanoCore-m...er.exe
windows10-2004-x64
1NanoCore-m...re.exe
windows10-2004-x64
10NanoCore-m...in.dll
windows10-2004-x64
1NanoCore-m...te.dll
windows10-2004-x64
1NanoCore-m...nt.exe
windows10-2004-x64
7NanoCore-m...op.dll
windows10-2004-x64
1NanoCore-m...op.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
06/02/2025, 07:59
Behavioral task
behavioral1
Sample
NanoCore-master/sample/ClientPlugin.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral2
Sample
NanoCore-master/sample/Interop.NATUPNPLib.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
NanoCore-master/sample/NanoCore Plugin Compiler.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral4
Sample
NanoCore-master/sample/NanoCore.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
NanoCore-master/sample/ServerPlugin.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral6
Sample
NanoCore-master/sample/System.Data.SQLite.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
NanoCore-master/sample/client.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral8
Sample
NanoCore-master/sample/x64/SQLite.Interop.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral9
Sample
NanoCore-master/sample/x86/SQLite.Interop.dll
Resource
win10v2004-20250129-en
General
-
Target
NanoCore-master/sample/client.exe
-
Size
87KB
-
MD5
e7dde6ff81df20066d7c57bb32d45193
-
SHA1
f4494f962a6241715f1d313fee37203b6607e42b
-
SHA256
f63d7fecabfd501643a12ff3988f2809a1573009a452510e286a91554d49599d
-
SHA512
da3ec487122b70a062dd7ffc792fc4d7cb223775a7e09ca9664bc259097d53ad93678cfeec32d554783f37f9d23a299a0e75ee7e9951abf9d4da8d55e58eb527
-
SSDEEP
1536:EtPtlChZHNnK1MJTmvuzazpZl4hTPnmOIP+LNPSP2avOauA:Edtl8NnwMJTm/9kTPnmOg+LNQ2aJuA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1660 client.exe Token: SeDebugPrivilege 2140 client.exe Token: SeDebugPrivilege 4668 client.exe Token: SeDebugPrivilege 3740 client.exe Token: SeDebugPrivilege 868 client.exe Token: SeDebugPrivilege 2872 client.exe Token: SeDebugPrivilege 3940 client.exe Token: SeDebugPrivilege 4200 client.exe Token: SeDebugPrivilege 4172 client.exe Token: SeDebugPrivilege 3372 client.exe Token: SeDebugPrivilege 2748 client.exe Token: SeDebugPrivilege 4688 client.exe Token: SeDebugPrivilege 1356 client.exe Token: SeDebugPrivilege 2104 client.exe Token: SeDebugPrivilege 184 client.exe Token: SeDebugPrivilege 3852 client.exe Token: SeDebugPrivilege 1520 client.exe Token: SeDebugPrivilege 2128 client.exe Token: SeDebugPrivilege 1816 client.exe Token: SeDebugPrivilege 3732 client.exe Token: SeDebugPrivilege 3268 client.exe Token: SeDebugPrivilege 708 client.exe Token: SeDebugPrivilege 4768 client.exe Token: SeDebugPrivilege 748 client.exe Token: SeDebugPrivilege 3576 client.exe Token: SeDebugPrivilege 924 client.exe Token: SeDebugPrivilege 3948 client.exe Token: SeDebugPrivilege 1152 client.exe Token: SeDebugPrivilege 1944 client.exe Token: SeDebugPrivilege 3368 client.exe Token: SeDebugPrivilege 4800 client.exe Token: SeDebugPrivilege 212 client.exe Token: SeDebugPrivilege 4060 client.exe Token: SeDebugPrivilege 4872 client.exe Token: SeDebugPrivilege 1508 client.exe Token: SeDebugPrivilege 4560 client.exe Token: SeDebugPrivilege 3788 client.exe Token: SeDebugPrivilege 1592 client.exe Token: SeDebugPrivilege 1408 client.exe Token: SeDebugPrivilege 432 client.exe Token: SeDebugPrivilege 3428 client.exe Token: SeDebugPrivilege 4932 client.exe Token: SeDebugPrivilege 2196 client.exe Token: SeDebugPrivilege 3108 client.exe Token: SeDebugPrivilege 1420 client.exe Token: SeDebugPrivilege 1404 client.exe Token: SeDebugPrivilege 2148 client.exe Token: SeDebugPrivilege 4068 client.exe Token: SeDebugPrivilege 1428 client.exe Token: SeDebugPrivilege 1944 client.exe Token: SeDebugPrivilege 3672 client.exe Token: SeDebugPrivilege 2352 client.exe Token: SeDebugPrivilege 3588 client.exe Token: SeDebugPrivilege 4988 client.exe Token: SeDebugPrivilege 1080 client.exe Token: SeDebugPrivilege 3728 client.exe Token: SeDebugPrivilege 1216 client.exe Token: SeDebugPrivilege 408 client.exe Token: SeDebugPrivilege 2160 client.exe Token: SeDebugPrivilege 3876 client.exe Token: SeDebugPrivilege 2604 client.exe Token: SeDebugPrivilege 2772 client.exe Token: SeDebugPrivilege 2460 client.exe Token: SeDebugPrivilege 2936 client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2140 1660 client.exe 89 PID 1660 wrote to memory of 2140 1660 client.exe 89 PID 2140 wrote to memory of 4668 2140 client.exe 90 PID 2140 wrote to memory of 4668 2140 client.exe 90 PID 4668 wrote to memory of 3740 4668 client.exe 93 PID 4668 wrote to memory of 3740 4668 client.exe 93 PID 3740 wrote to memory of 868 3740 client.exe 94 PID 3740 wrote to memory of 868 3740 client.exe 94 PID 868 wrote to memory of 2872 868 client.exe 95 PID 868 wrote to memory of 2872 868 client.exe 95 PID 2872 wrote to memory of 3940 2872 client.exe 98 PID 2872 wrote to memory of 3940 2872 client.exe 98 PID 3940 wrote to memory of 4200 3940 client.exe 99 PID 3940 wrote to memory of 4200 3940 client.exe 99 PID 4200 wrote to memory of 4172 4200 client.exe 100 PID 4200 wrote to memory of 4172 4200 client.exe 100 PID 4172 wrote to memory of 3372 4172 client.exe 101 PID 4172 wrote to memory of 3372 4172 client.exe 101 PID 3372 wrote to memory of 2748 3372 client.exe 102 PID 3372 wrote to memory of 2748 3372 client.exe 102 PID 2748 wrote to memory of 4688 2748 client.exe 103 PID 2748 wrote to memory of 4688 2748 client.exe 103 PID 4688 wrote to memory of 1356 4688 client.exe 104 PID 4688 wrote to memory of 1356 4688 client.exe 104 PID 1356 wrote to memory of 2104 1356 client.exe 105 PID 1356 wrote to memory of 2104 1356 client.exe 105 PID 2104 wrote to memory of 184 2104 client.exe 107 PID 2104 wrote to memory of 184 2104 client.exe 107 PID 184 wrote to memory of 3852 184 client.exe 109 PID 184 wrote to memory of 3852 184 client.exe 109 PID 3852 wrote to memory of 1520 3852 client.exe 110 PID 3852 wrote to memory of 1520 3852 client.exe 110 PID 1520 wrote to memory of 5044 1520 client.exe 111 PID 1520 wrote to memory of 5044 1520 client.exe 111 PID 2128 wrote to memory of 1816 2128 client.exe 113 PID 2128 wrote to memory of 1816 2128 client.exe 113 PID 1816 wrote to memory of 3732 1816 client.exe 115 PID 1816 wrote to memory of 3732 1816 client.exe 115 PID 3732 wrote to memory of 3268 3732 client.exe 116 PID 3732 wrote to memory of 3268 3732 client.exe 116 PID 3268 wrote to memory of 708 3268 client.exe 117 PID 3268 wrote to memory of 708 3268 client.exe 117 PID 708 wrote to memory of 4768 708 client.exe 118 PID 708 wrote to memory of 4768 708 client.exe 118 PID 4768 wrote to memory of 748 4768 client.exe 119 PID 4768 wrote to memory of 748 4768 client.exe 119 PID 748 wrote to memory of 3576 748 client.exe 120 PID 748 wrote to memory of 3576 748 client.exe 120 PID 3576 wrote to memory of 924 3576 client.exe 122 PID 3576 wrote to memory of 924 3576 client.exe 122 PID 924 wrote to memory of 3948 924 client.exe 123 PID 924 wrote to memory of 3948 924 client.exe 123 PID 3948 wrote to memory of 1152 3948 client.exe 124 PID 3948 wrote to memory of 1152 3948 client.exe 124 PID 1152 wrote to memory of 1944 1152 client.exe 125 PID 1152 wrote to memory of 1944 1152 client.exe 125 PID 1944 wrote to memory of 3368 1944 client.exe 126 PID 1944 wrote to memory of 3368 1944 client.exe 126 PID 3368 wrote to memory of 4800 3368 client.exe 127 PID 3368 wrote to memory of 4800 3368 client.exe 127 PID 4800 wrote to memory of 212 4800 client.exe 128 PID 4800 wrote to memory of 212 4800 client.exe 128 PID 212 wrote to memory of 4060 212 client.exe 129 PID 212 wrote to memory of 4060 212 client.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"6⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"7⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"8⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"9⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"10⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"11⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"13⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"14⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"15⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"16⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"17⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"18⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"19⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"20⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"21⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"22⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"23⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"24⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"25⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"26⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"27⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"28⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"29⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"30⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"31⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"32⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"33⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"34⤵
- Suspicious use of AdjustPrivilegeToken
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"35⤵
- Suspicious use of AdjustPrivilegeToken
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"36⤵
- Suspicious use of AdjustPrivilegeToken
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"37⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"38⤵
- Suspicious use of AdjustPrivilegeToken
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"39⤵
- Suspicious use of AdjustPrivilegeToken
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"40⤵
- Suspicious use of AdjustPrivilegeToken
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"41⤵
- Suspicious use of AdjustPrivilegeToken
PID:432 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"42⤵
- Suspicious use of AdjustPrivilegeToken
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"43⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"44⤵
- Suspicious use of AdjustPrivilegeToken
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"45⤵
- Suspicious use of AdjustPrivilegeToken
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"46⤵
- Suspicious use of AdjustPrivilegeToken
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"47⤵
- Suspicious use of AdjustPrivilegeToken
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"48⤵
- Suspicious use of AdjustPrivilegeToken
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"49⤵
- Suspicious use of AdjustPrivilegeToken
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"50⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"51⤵
- Suspicious use of AdjustPrivilegeToken
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"52⤵
- Suspicious use of AdjustPrivilegeToken
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"53⤵
- Suspicious use of AdjustPrivilegeToken
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"54⤵
- Suspicious use of AdjustPrivilegeToken
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"55⤵
- Suspicious use of AdjustPrivilegeToken
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"56⤵
- Suspicious use of AdjustPrivilegeToken
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"57⤵
- Suspicious use of AdjustPrivilegeToken
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"58⤵
- Suspicious use of AdjustPrivilegeToken
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"59⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:408 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"60⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"61⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"62⤵
- Suspicious use of AdjustPrivilegeToken
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"63⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"64⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"65⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"66⤵
- Checks computer location settings
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"67⤵
- Checks computer location settings
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"68⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"69⤵
- Checks computer location settings
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"70⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"71⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"72⤵
- Checks computer location settings
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"73⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"74⤵
- Checks computer location settings
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"75⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"76⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"77⤵
- Checks computer location settings
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"78⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"79⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"80⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"81⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"82⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"83⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"84⤵
- Checks computer location settings
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"85⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"86⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"87⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"88⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"89⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"90⤵
- Checks computer location settings
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"91⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"92⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"93⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"94⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"95⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"96⤵
- Checks computer location settings
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"97⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"98⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"99⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"100⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"101⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"102⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"103⤵
- Checks computer location settings
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"104⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"105⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"106⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"107⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"108⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"109⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"110⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"111⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"112⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"113⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"114⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"115⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"116⤵PID:664
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"117⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"118⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"119⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"120⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"121⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"122⤵PID:624
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-