Overview
overview
10Static
static
10NanoCore-m...in.dll
windows7-x64
1NanoCore-m...in.dll
windows10-2004-x64
1NanoCore-m...ib.dll
windows7-x64
1NanoCore-m...ib.dll
windows10-2004-x64
1NanoCore-m...er.exe
windows7-x64
1NanoCore-m...er.exe
windows10-2004-x64
1NanoCore-m...re.exe
windows7-x64
10NanoCore-m...re.exe
windows10-2004-x64
10NanoCore-m...in.dll
windows7-x64
1NanoCore-m...in.dll
windows10-2004-x64
1NanoCore-m...te.dll
windows7-x64
1NanoCore-m...te.dll
windows10-2004-x64
1NanoCore-m...nt.exe
windows7-x64
3NanoCore-m...nt.exe
windows10-2004-x64
7NanoCore-m...op.dll
windows7-x64
1NanoCore-m...op.dll
windows10-2004-x64
1NanoCore-m...op.dll
windows7-x64
3NanoCore-m...op.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
06/02/2025, 08:06
Behavioral task
behavioral1
Sample
NanoCore-master/sample/ClientPlugin.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NanoCore-master/sample/ClientPlugin.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
NanoCore-master/sample/Interop.NATUPNPLib.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
NanoCore-master/sample/Interop.NATUPNPLib.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
NanoCore-master/sample/NanoCore Plugin Compiler.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
NanoCore-master/sample/NanoCore Plugin Compiler.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
NanoCore-master/sample/NanoCore.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
NanoCore-master/sample/NanoCore.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral9
Sample
NanoCore-master/sample/ServerPlugin.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
NanoCore-master/sample/ServerPlugin.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral11
Sample
NanoCore-master/sample/System.Data.SQLite.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
NanoCore-master/sample/System.Data.SQLite.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
NanoCore-master/sample/client.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
NanoCore-master/sample/client.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral15
Sample
NanoCore-master/sample/x64/SQLite.Interop.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
NanoCore-master/sample/x64/SQLite.Interop.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral17
Sample
NanoCore-master/sample/x86/SQLite.Interop.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
NanoCore-master/sample/x86/SQLite.Interop.dll
Resource
win10v2004-20250129-en
General
-
Target
NanoCore-master/sample/client.exe
-
Size
87KB
-
MD5
e7dde6ff81df20066d7c57bb32d45193
-
SHA1
f4494f962a6241715f1d313fee37203b6607e42b
-
SHA256
f63d7fecabfd501643a12ff3988f2809a1573009a452510e286a91554d49599d
-
SHA512
da3ec487122b70a062dd7ffc792fc4d7cb223775a7e09ca9664bc259097d53ad93678cfeec32d554783f37f9d23a299a0e75ee7e9951abf9d4da8d55e58eb527
-
SSDEEP
1536:EtPtlChZHNnK1MJTmvuzazpZl4hTPnmOIP+LNPSP2avOauA:Edtl8NnwMJTm/9kTPnmOg+LNQ2aJuA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3616 client.exe Token: SeDebugPrivilege 1172 client.exe Token: SeDebugPrivilege 1148 client.exe Token: SeDebugPrivilege 2324 client.exe Token: SeDebugPrivilege 4424 client.exe Token: SeDebugPrivilege 3248 client.exe Token: SeDebugPrivilege 5096 client.exe Token: SeDebugPrivilege 4376 client.exe Token: SeDebugPrivilege 1064 client.exe Token: SeDebugPrivilege 4832 client.exe Token: SeDebugPrivilege 4064 client.exe Token: SeDebugPrivilege 1288 client.exe Token: SeDebugPrivilege 688 client.exe Token: SeDebugPrivilege 3740 client.exe Token: SeDebugPrivilege 2992 client.exe Token: SeDebugPrivilege 4400 client.exe Token: SeDebugPrivilege 4180 client.exe Token: SeDebugPrivilege 2360 client.exe Token: SeDebugPrivilege 2184 client.exe Token: SeDebugPrivilege 2012 client.exe Token: SeDebugPrivilege 4000 client.exe Token: SeDebugPrivilege 324 client.exe Token: SeDebugPrivilege 2948 client.exe Token: SeDebugPrivilege 536 client.exe Token: SeDebugPrivilege 1836 client.exe Token: SeDebugPrivilege 3512 client.exe Token: SeDebugPrivilege 4760 client.exe Token: SeDebugPrivilege 1216 client.exe Token: SeDebugPrivilege 3476 client.exe Token: SeDebugPrivilege 476 client.exe Token: SeDebugPrivilege 1228 client.exe Token: SeDebugPrivilege 3264 client.exe Token: SeDebugPrivilege 2228 client.exe Token: SeDebugPrivilege 3196 client.exe Token: SeDebugPrivilege 3208 client.exe Token: SeDebugPrivilege 4004 client.exe Token: SeDebugPrivilege 3272 client.exe Token: SeDebugPrivilege 3544 client.exe Token: SeDebugPrivilege 4676 client.exe Token: SeDebugPrivilege 2168 client.exe Token: SeDebugPrivilege 1172 client.exe Token: SeDebugPrivilege 3848 client.exe Token: SeDebugPrivilege 3756 client.exe Token: SeDebugPrivilege 3108 client.exe Token: SeDebugPrivilege 744 client.exe Token: SeDebugPrivilege 564 client.exe Token: SeDebugPrivilege 2792 client.exe Token: SeDebugPrivilege 1732 client.exe Token: SeDebugPrivilege 4896 client.exe Token: SeDebugPrivilege 3904 client.exe Token: SeDebugPrivilege 3884 client.exe Token: SeDebugPrivilege 2608 client.exe Token: SeDebugPrivilege 4664 client.exe Token: SeDebugPrivilege 688 client.exe Token: SeDebugPrivilege 3696 client.exe Token: SeDebugPrivilege 2200 client.exe Token: SeDebugPrivilege 4148 client.exe Token: SeDebugPrivilege 1808 client.exe Token: SeDebugPrivilege 3092 client.exe Token: SeDebugPrivilege 440 client.exe Token: SeDebugPrivilege 1792 client.exe Token: SeDebugPrivilege 4844 client.exe Token: SeDebugPrivilege 2584 client.exe Token: SeDebugPrivilege 892 client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3616 wrote to memory of 1172 3616 client.exe 87 PID 3616 wrote to memory of 1172 3616 client.exe 87 PID 1172 wrote to memory of 1148 1172 client.exe 88 PID 1172 wrote to memory of 1148 1172 client.exe 88 PID 1148 wrote to memory of 2324 1148 client.exe 89 PID 1148 wrote to memory of 2324 1148 client.exe 89 PID 2324 wrote to memory of 4424 2324 client.exe 90 PID 2324 wrote to memory of 4424 2324 client.exe 90 PID 4424 wrote to memory of 3248 4424 client.exe 91 PID 4424 wrote to memory of 3248 4424 client.exe 91 PID 3248 wrote to memory of 5096 3248 client.exe 94 PID 3248 wrote to memory of 5096 3248 client.exe 94 PID 5096 wrote to memory of 4376 5096 client.exe 95 PID 5096 wrote to memory of 4376 5096 client.exe 95 PID 4376 wrote to memory of 1064 4376 client.exe 96 PID 4376 wrote to memory of 1064 4376 client.exe 96 PID 1064 wrote to memory of 4832 1064 client.exe 97 PID 1064 wrote to memory of 4832 1064 client.exe 97 PID 4832 wrote to memory of 4064 4832 client.exe 99 PID 4832 wrote to memory of 4064 4832 client.exe 99 PID 4064 wrote to memory of 1288 4064 client.exe 101 PID 4064 wrote to memory of 1288 4064 client.exe 101 PID 1288 wrote to memory of 688 1288 client.exe 102 PID 1288 wrote to memory of 688 1288 client.exe 102 PID 688 wrote to memory of 3740 688 client.exe 103 PID 688 wrote to memory of 3740 688 client.exe 103 PID 3740 wrote to memory of 2992 3740 client.exe 104 PID 3740 wrote to memory of 2992 3740 client.exe 104 PID 2992 wrote to memory of 4400 2992 client.exe 105 PID 2992 wrote to memory of 4400 2992 client.exe 105 PID 4400 wrote to memory of 4180 4400 client.exe 106 PID 4400 wrote to memory of 4180 4400 client.exe 106 PID 4180 wrote to memory of 2360 4180 client.exe 107 PID 4180 wrote to memory of 2360 4180 client.exe 107 PID 2360 wrote to memory of 2184 2360 client.exe 108 PID 2360 wrote to memory of 2184 2360 client.exe 108 PID 2184 wrote to memory of 2012 2184 client.exe 110 PID 2184 wrote to memory of 2012 2184 client.exe 110 PID 2012 wrote to memory of 4000 2012 client.exe 111 PID 2012 wrote to memory of 4000 2012 client.exe 111 PID 4000 wrote to memory of 324 4000 client.exe 112 PID 4000 wrote to memory of 324 4000 client.exe 112 PID 324 wrote to memory of 2948 324 client.exe 113 PID 324 wrote to memory of 2948 324 client.exe 113 PID 2948 wrote to memory of 536 2948 client.exe 114 PID 2948 wrote to memory of 536 2948 client.exe 114 PID 536 wrote to memory of 1836 536 client.exe 115 PID 536 wrote to memory of 1836 536 client.exe 115 PID 1836 wrote to memory of 3512 1836 client.exe 116 PID 1836 wrote to memory of 3512 1836 client.exe 116 PID 3512 wrote to memory of 4760 3512 client.exe 117 PID 3512 wrote to memory of 4760 3512 client.exe 117 PID 4760 wrote to memory of 1216 4760 client.exe 118 PID 4760 wrote to memory of 1216 4760 client.exe 118 PID 1216 wrote to memory of 3476 1216 client.exe 120 PID 1216 wrote to memory of 3476 1216 client.exe 120 PID 3476 wrote to memory of 476 3476 client.exe 121 PID 3476 wrote to memory of 476 3476 client.exe 121 PID 476 wrote to memory of 1228 476 client.exe 122 PID 476 wrote to memory of 1228 476 client.exe 122 PID 1228 wrote to memory of 3264 1228 client.exe 123 PID 1228 wrote to memory of 3264 1228 client.exe 123 PID 3264 wrote to memory of 2228 3264 client.exe 124 PID 3264 wrote to memory of 2228 3264 client.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"6⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"7⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"8⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"9⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"10⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"11⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"13⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"14⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"15⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"16⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"17⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"18⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"19⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"20⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"21⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"22⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"23⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"24⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"25⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"26⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"27⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"28⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"29⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"30⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"31⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"32⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"33⤵
- Suspicious use of AdjustPrivilegeToken
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"34⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"35⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"36⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"37⤵
- Suspicious use of AdjustPrivilegeToken
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"38⤵
- Suspicious use of AdjustPrivilegeToken
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"39⤵
- Suspicious use of AdjustPrivilegeToken
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"40⤵
- Suspicious use of AdjustPrivilegeToken
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"41⤵
- Suspicious use of AdjustPrivilegeToken
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"42⤵
- Suspicious use of AdjustPrivilegeToken
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"43⤵
- Suspicious use of AdjustPrivilegeToken
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"44⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"45⤵
- Suspicious use of AdjustPrivilegeToken
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"46⤵
- Suspicious use of AdjustPrivilegeToken
PID:744 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"47⤵
- Suspicious use of AdjustPrivilegeToken
PID:564 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"48⤵
- Suspicious use of AdjustPrivilegeToken
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"49⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"50⤵
- Suspicious use of AdjustPrivilegeToken
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"51⤵
- Suspicious use of AdjustPrivilegeToken
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"52⤵
- Suspicious use of AdjustPrivilegeToken
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"53⤵
- Suspicious use of AdjustPrivilegeToken
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"54⤵
- Suspicious use of AdjustPrivilegeToken
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"55⤵
- Suspicious use of AdjustPrivilegeToken
PID:688 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"56⤵
- Suspicious use of AdjustPrivilegeToken
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"57⤵
- Suspicious use of AdjustPrivilegeToken
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"58⤵
- Suspicious use of AdjustPrivilegeToken
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"59⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"60⤵
- Suspicious use of AdjustPrivilegeToken
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"61⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:440 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"62⤵
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"63⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"64⤵
- Suspicious use of AdjustPrivilegeToken
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"65⤵
- Suspicious use of AdjustPrivilegeToken
PID:892 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"66⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"67⤵
- Checks computer location settings
PID:536 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"68⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"69⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"70⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"71⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"72⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"73⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"74⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"75⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"76⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"77⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"78⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"79⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"80⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"81⤵
- Checks computer location settings
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"82⤵
- Checks computer location settings
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"83⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"84⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"85⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"86⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"87⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"88⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"89⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"90⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"91⤵
- Checks computer location settings
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"92⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"93⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"94⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"95⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"96⤵
- Checks computer location settings
PID:632 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"97⤵
- Checks computer location settings
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"98⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"99⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"100⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"101⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"102⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"103⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"104⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"105⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"106⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"107⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"108⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"109⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"110⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"111⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"112⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"113⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"114⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"115⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"116⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"117⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"118⤵
- Checks computer location settings
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"119⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"120⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"121⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"C:\Users\Admin\AppData\Local\Temp\NanoCore-master\sample\client.exe"122⤵PID:4876
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-