Loading ...

Play interactive tourEdit tour

Windows Analysis Report iGZtra5EaP.exe

Overview

General Information

Sample Name:iGZtra5EaP.exe
Analysis ID:458908
MD5:5abfc84b2a671617a4930a61e218b6c6
SHA1:fb2e5175272b90aa204853dd2ba2dc175ff5958f
SHA256:776e6e841b2a1b1dacd2beb12f76949dc9a395a45bd7107475d90b60f09e5f39
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • iGZtra5EaP.exe (PID: 5832 cmdline: 'C:\Users\user\Desktop\iGZtra5EaP.exe' MD5: 5ABFC84B2A671617A4930A61E218B6C6)
    • schtasks.exe (PID: 6008 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmp3997.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • iGZtra5EaP.exe (PID: 4720 cmdline: {path} MD5: 5ABFC84B2A671617A4930A61E218B6C6)
      • schtasks.exe (PID: 4664 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp489A.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 2588 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5556 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp4CC2.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • iGZtra5EaP.exe (PID: 1288 cmdline: C:\Users\user\Desktop\iGZtra5EaP.exe 0 MD5: 5ABFC84B2A671617A4930A61E218B6C6)
    • schtasks.exe (PID: 5044 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmpF219.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • iGZtra5EaP.exe (PID: 5016 cmdline: {path} MD5: 5ABFC84B2A671617A4930A61E218B6C6)
  • dhcpmon.exe (PID: 496 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 5ABFC84B2A671617A4930A61E218B6C6)
    • schtasks.exe (PID: 5004 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmpF5E2.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 1324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 3008 cmdline: {path} MD5: 5ABFC84B2A671617A4930A61E218B6C6)
  • dhcpmon.exe (PID: 5756 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 5ABFC84B2A671617A4930A61E218B6C6)
    • schtasks.exe (PID: 1036 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmp63D.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 5200 cmdline: {path} MD5: 5ABFC84B2A671617A4930A61E218B6C6)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "f0d143be-967c-4293-98d3-3a1e128b", "Group": "BotNet", "Domain1": "microsoftsecurity.sytes.net", "Domain2": "backupnew.duckdns.org", "Port": 1177, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Enable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000001B.00000002.417862891.0000000002A11000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000001B.00000002.417862891.0000000002A11000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x6934b:$a: NanoCore
    • 0x693a4:$a: NanoCore
    • 0x693e1:$a: NanoCore
    • 0x6945a:$a: NanoCore
    • 0x693ad:$b: ClientPlugin
    • 0x693ea:$b: ClientPlugin
    • 0x69ce8:$b: ClientPlugin
    • 0x69cf5:$b: ClientPlugin
    • 0x5f4d6:$e: KeepAlive
    • 0x69835:$g: LogClientMessage
    • 0x697b5:$i: get_Connected
    • 0x59781:$j: #=q
    • 0x597b1:$j: #=q
    • 0x597ed:$j: #=q
    • 0x59815:$j: #=q
    • 0x59845:$j: #=q
    • 0x59875:$j: #=q
    • 0x598a5:$j: #=q
    • 0x598d5:$j: #=q
    • 0x598f1:$j: #=q
    • 0x59921:$j: #=q
    0000000C.00000002.482078580.0000000006E40000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x350b:$x1: NanoCore.ClientPluginHost
    • 0x3525:$x2: IClientNetworkHost
    0000000C.00000002.482078580.0000000006E40000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x350b:$x2: NanoCore.ClientPluginHost
    • 0x52b6:$s4: PipeCreated
    • 0x34f8:$s5: IClientLoggingHost
    00000021.00000002.428437498.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    Click to see the 96 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    12.2.iGZtra5EaP.exe.6de0000.35.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x13a8:$x1: NanoCore.ClientPluginHost
    12.2.iGZtra5EaP.exe.6de0000.35.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x13a8:$x2: NanoCore.ClientPluginHost
    • 0x1486:$s4: PipeCreated
    • 0x13c2:$s5: IClientLoggingHost
    12.2.iGZtra5EaP.exe.6e10000.38.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1deb:$x1: NanoCore.ClientPluginHost
    • 0x1e24:$x2: IClientNetworkHost
    12.2.iGZtra5EaP.exe.6e10000.38.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x1deb:$x2: NanoCore.ClientPluginHost
    • 0x1f36:$s4: PipeCreated
    • 0x1e05:$s5: IClientLoggingHost
    33.2.dhcpmon.exe.3009684.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    Click to see the 237 entries

    Sigma Overview

    AV Detection:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\iGZtra5EaP.exe, ProcessId: 4720, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    E-Banking Fraud:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\iGZtra5EaP.exe, ProcessId: 4720, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Stealing of Sensitive Information:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\iGZtra5EaP.exe, ProcessId: 4720, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Remote Access Functionality:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\iGZtra5EaP.exe, ProcessId: 4720, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: 0000001B.00000002.417862891.0000000002A11000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "f0d143be-967c-4293-98d3-3a1e128b", "Group": "BotNet", "Domain1": "microsoftsecurity.sytes.net", "Domain2": "backupnew.duckdns.org", "Port": 1177, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Enable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
    Multi AV Scanner detection for domain / URLShow sources
    Source: backupnew.duckdns.orgVirustotal: Detection: 8%Perma Link
    Source: microsoftsecurity.sytes.netVirustotal: Detection: 8%Perma Link
    Source: backupnew.duckdns.orgVirustotal: Detection: 8%Perma Link
    Multi AV Scanner detection for dropped fileShow sources
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 64%
    Source: C:\Users\user\AppData\Roaming\eBopYzBwUYOW.exeReversingLabs: Detection: 64%
    Multi AV Scanner detection for submitted fileShow sources
    Source: iGZtra5EaP.exeVirustotal: Detection: 48%Perma Link
    Source: iGZtra5EaP.exeReversingLabs: Detection: 64%
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 30.2.dhcpmon.exe.4060614.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.3a64c3d.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 17.2.iGZtra5EaP.exe.3b59930.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 20.2.dhcpmon.exe.4149930.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.44d4c3d.15.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.69d4629.30.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3ff0614.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 30.2.dhcpmon.exe.405b7de.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.448e778.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 30.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3feb7de.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.69d0000.31.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.48e3e40.25.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.4099930.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.69d0000.31.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.4492da1.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.4553c80.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.44d0614.14.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.3a60614.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 20.2.dhcpmon.exe.4149930.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.3a5b7de.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 30.2.dhcpmon.exe.4064c3d.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.4489942.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.454ee4a.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.4553c80.19.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.44cb7de.16.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.3a60614.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.48e3e40.25.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3ff4c3d.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.448e778.11.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.45582a9.17.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.4099930.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 30.2.dhcpmon.exe.4060614.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3ff0614.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.iGZtra5EaP.exe.3cc9930.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.iGZtra5EaP.exe.3cfc550.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.44d0614.14.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.iGZtra5EaP.exe.3cc9930.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 17.2.iGZtra5EaP.exe.3b59930.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.471931d.20.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.48e8469.24.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.472d94a.22.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.470d0e9.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000001B.00000002.417862891.0000000002A11000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000021.00000002.428437498.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.476961664.000000000454E000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000014.00000002.412689646.0000000004149000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001E.00000002.422052368.0000000003011000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001E.00000002.417477798.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000021.00000002.431850871.0000000003FA9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.481497763.00000000069D0000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000012.00000002.404628541.0000000004099000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.467302367.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.415827598.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.477941629.00000000048DF000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.294511650.0000000003CC9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.476599395.00000000044C9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000011.00000002.400817271.0000000003B59000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.418018556.0000000003A19000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001E.00000002.423536148.0000000004019000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.476392070.0000000004481000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000021.00000002.431679291.0000000002FA1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.472713339.0000000003481000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: iGZtra5EaP.exe PID: 5832, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: iGZtra5EaP.exe PID: 4720, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: iGZtra5EaP.exe PID: 5016, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3008, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5200, type: MEMORYSTR
    Machine Learning detection for dropped fileShow sources
    Source: C:\Users\user\AppData\Roaming\eBopYzBwUYOW.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
    Machine Learning detection for sampleShow sources
    Source: iGZtra5EaP.exeJoe Sandbox ML: detected
    Source: 27.2.iGZtra5EaP.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 30.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 12.2.iGZtra5EaP.exe.69d0000.31.unpackAvira: Label: TR/NanoCore.fadte
    Source: 12.2.iGZtra5EaP.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 33.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: iGZtra5EaP.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Source: iGZtra5EaP.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 4x nop then pop ebp
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 4x nop then pop ebp
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]

    Networking:

    barindex
    Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49737 -> 20.197.234.75:1177
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49743 -> 20.197.234.75:1177
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49744 -> 20.197.234.75:1177
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49745 -> 20.197.234.75:1177
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: backupnew.duckdns.org
    Source: Malware configuration extractorURLs: microsoftsecurity.sytes.net
    Uses dynamic DNS servicesShow sources
    Source: unknownDNS query: name: backupnew.duckdns.org
    Source: global trafficTCP traffic: 192.168.2.3:49724 -> 20.206.66.33:1177
    Source: global trafficTCP traffic: 192.168.2.3:49737 -> 20.197.234.75:1177
    Source: unknownDNS traffic detected: queries for: microsoftsecurity.sytes.net
    Source: iGZtra5EaP.exeString found in binary or memory: http://douglasheriot.com/uno/
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpString found in binary or memory: http://google.com
    Source: iGZtra5EaP.exe, 00000000.00000002.293558443.0000000002CC1000.00000004.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.398277931.0000000002B51000.00000004.00000001.sdmp, dhcpmon.exe, 00000012.00000002.400511596.0000000003091000.00000004.00000001.sdmp, dhcpmon.exe, 00000014.00000002.411142657.0000000003141000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
    Source: dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
    Source: dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
    Source: iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

    E-Banking Fraud:

    barindex
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 30.2.dhcpmon.exe.4060614.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.3a64c3d.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 17.2.iGZtra5EaP.exe.3b59930.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 20.2.dhcpmon.exe.4149930.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.44d4c3d.15.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.69d4629.30.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3ff0614.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 30.2.dhcpmon.exe.405b7de.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.448e778.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 30.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3feb7de.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.69d0000.31.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.48e3e40.25.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.4099930.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.69d0000.31.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.4492da1.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.4553c80.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.44d0614.14.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.3a60614.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 20.2.dhcpmon.exe.4149930.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.3a5b7de.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 30.2.dhcpmon.exe.4064c3d.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.4489942.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.454ee4a.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.4553c80.19.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.44cb7de.16.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.3a60614.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.48e3e40.25.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3ff4c3d.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.448e778.11.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.45582a9.17.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.4099930.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 30.2.dhcpmon.exe.4060614.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3ff0614.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.iGZtra5EaP.exe.3cc9930.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.iGZtra5EaP.exe.3cfc550.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.44d0614.14.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.iGZtra5EaP.exe.3cc9930.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 17.2.iGZtra5EaP.exe.3b59930.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.471931d.20.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.48e8469.24.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.472d94a.22.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.470d0e9.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000001B.00000002.417862891.0000000002A11000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000021.00000002.428437498.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.476961664.000000000454E000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000014.00000002.412689646.0000000004149000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001E.00000002.422052368.0000000003011000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001E.00000002.417477798.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000021.00000002.431850871.0000000003FA9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.481497763.00000000069D0000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000012.00000002.404628541.0000000004099000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.467302367.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.415827598.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.477941629.00000000048DF000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.294511650.0000000003CC9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.476599395.00000000044C9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000011.00000002.400817271.0000000003B59000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.418018556.0000000003A19000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001E.00000002.423536148.0000000004019000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.476392070.0000000004481000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000021.00000002.431679291.0000000002FA1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.472713339.0000000003481000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: iGZtra5EaP.exe PID: 5832, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: iGZtra5EaP.exe PID: 4720, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: iGZtra5EaP.exe PID: 5016, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3008, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5200, type: MEMORYSTR

    System Summary:

    barindex
    Malicious sample detected (through community Yara rule)Show sources
    Source: 12.2.iGZtra5EaP.exe.6de0000.35.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.6e10000.38.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 33.2.dhcpmon.exe.3009684.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.6760000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 30.2.dhcpmon.exe.4060614.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 27.2.iGZtra5EaP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 27.2.iGZtra5EaP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 27.2.iGZtra5EaP.exe.3a64c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.6e40000.40.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 17.2.iGZtra5EaP.exe.3b59930.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 17.2.iGZtra5EaP.exe.3b59930.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 20.2.dhcpmon.exe.4149930.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 20.2.dhcpmon.exe.4149930.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.44d4c3d.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.69d4629.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.6e54c9f.43.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 33.2.dhcpmon.exe.3ff0614.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.6e90000.44.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.6e10000.38.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 30.2.dhcpmon.exe.405b7de.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 30.2.dhcpmon.exe.405b7de.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.37e1a28.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.37e1a28.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.37cd3a8.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.6dd0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.448e778.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.34b6ba0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.6e20000.39.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 30.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 30.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.1ad0000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 33.2.dhcpmon.exe.3feb7de.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 33.2.dhcpmon.exe.3feb7de.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.48fc66c.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.470d0e9.21.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.69d0000.31.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.353c47c.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.353c47c.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.48e3e40.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 18.2.dhcpmon.exe.4099930.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 18.2.dhcpmon.exe.4099930.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.6db0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.69d0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.4492da1.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.4553c80.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.4553c80.19.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.44d0614.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 27.2.iGZtra5EaP.exe.3a60614.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 20.2.dhcpmon.exe.4149930.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 20.2.dhcpmon.exe.4149930.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.6e5e8a4.41.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 27.2.iGZtra5EaP.exe.3a5b7de.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 27.2.iGZtra5EaP.exe.3a5b7de.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 30.2.dhcpmon.exe.3079684.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 27.2.iGZtra5EaP.exe.2a7956c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.6df0000.36.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.6e20000.39.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.1ad0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 30.2.dhcpmon.exe.4064c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.6e00000.37.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.6e90000.44.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.6e40000.40.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.6e00000.37.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.4489942.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.4489942.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.454ee4a.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.454ee4a.18.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.4553c80.19.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.6760000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.353c47c.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.44cb7de.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.44cb7de.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 27.2.iGZtra5EaP.exe.3a60614.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.48e3e40.25.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 33.2.dhcpmon.exe.3ff4c3d.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.448e778.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.45582a9.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.45582a9.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.35486f8.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 18.2.dhcpmon.exe.4099930.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 18.2.dhcpmon.exe.4099930.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.37c111c.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 30.2.dhcpmon.exe.4060614.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 33.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 33.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 33.2.dhcpmon.exe.3ff0614.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.471931d.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.5ec0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.35486f8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.35486f8.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.iGZtra5EaP.exe.3cc9930.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.iGZtra5EaP.exe.3cc9930.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.iGZtra5EaP.exe.3cfc550.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.iGZtra5EaP.exe.3cfc550.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.6e50000.42.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.6dd0000.34.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.6e50000.42.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.355cd68.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.355cd68.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.6df0000.36.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.37c111c.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.37c111c.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.44d0614.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.48fc66c.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.48fc66c.23.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0.2.iGZtra5EaP.exe.3cc9930.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.iGZtra5EaP.exe.3cc9930.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 17.2.iGZtra5EaP.exe.3b59930.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 17.2.iGZtra5EaP.exe.3b59930.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.37cd3a8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.37cd3a8.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.471931d.20.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.48e8469.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 12.2.iGZtra5EaP.exe.48e8469.24.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.472d94a.22.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 12.2.iGZtra5EaP.exe.470d0e9.21.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000001B.00000002.417862891.0000000002A11000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000C.00000002.482078580.0000000006E40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000021.00000002.428437498.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000021.00000002.428437498.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000C.00000002.476961664.000000000454E000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000C.00000002.482179100.0000000006E90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000C.00000002.471078718.0000000001AD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000014.00000002.412689646.0000000004149000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000014.00000002.412689646.0000000004149000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000C.00000002.475401082.000000000374C000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000C.00000002.481910813.0000000006DB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000C.00000002.481995550.0000000006E00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000001E.00000002.422052368.0000000003011000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000001E.00000002.417477798.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000001E.00000002.417477798.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000021.00000002.431850871.0000000003FA9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000C.00000002.481497763.00000000069D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000C.00000002.482020693.0000000006E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000C.00000002.481961618.0000000006DE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000C.00000002.481945946.0000000006DD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000012.00000002.404628541.0000000004099000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000012.00000002.404628541.0000000004099000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000C.00000002.467302367.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000C.00000002.467302367.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000C.00000002.482036750.0000000006E20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000C.00000002.473787584.00000000034F7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000001B.00000002.415827598.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000001B.00000002.415827598.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000C.00000002.480093816.0000000005EC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000C.00000002.482102080.0000000006E50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000C.00000002.477941629.00000000048DF000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000002.294511650.0000000003CC9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000000.00000002.294511650.0000000003CC9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000C.00000002.480306697.0000000006760000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0000000C.00000002.476599395.00000000044C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000011.00000002.400817271.0000000003B59000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000011.00000002.400817271.0000000003B59000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000001B.00000002.418018556.0000000003A19000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000001E.00000002.423536148.0000000004019000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000C.00000002.476392070.0000000004481000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000C.00000002.481978911.0000000006DF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000021.00000002.431679291.0000000002FA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: iGZtra5EaP.exe PID: 5832, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: iGZtra5EaP.exe PID: 5832, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: iGZtra5EaP.exe PID: 4720, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: iGZtra5EaP.exe PID: 4720, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: iGZtra5EaP.exe PID: 5016, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: iGZtra5EaP.exe PID: 5016, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: dhcpmon.exe PID: 3008, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: dhcpmon.exe PID: 3008, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: dhcpmon.exe PID: 5200, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: dhcpmon.exe PID: 5200, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 0_2_02B57E88
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 0_2_02B5D424
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 0_2_02B57E79
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 0_2_052A1AC0
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 0_2_052AA5E4
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_0182E480
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_0182E471
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_0182BBD4
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DC0040
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DC8D08
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DC9B98
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DC9C56
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_01047E79
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_0104D424
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_050D1AC0
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_050D0006
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_050D0040
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_050D1AB1
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_084BA1B8
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_084B6220
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_084B4230
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_084B4B00
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_084B9588
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_084BA1AA
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_084BE4F8
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_084BA488
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_084BA482
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_084B957A
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_084B3EE8
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_084B9F58
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_02E67E88
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_02E6D424
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_02E67E79
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_05651AC0
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_05650040
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_05650006
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_05651AB1
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_0711DF70
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_071147E0
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_07117EB0
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_0711E6F8
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_07114D78
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_0711C5B0
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_07115CC8
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_07114A50
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_07115908
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_07115140
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_07118990
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_071147D0
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_07114D67
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_07116C22
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_07116C28
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_0711D458
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_07115CB8
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_07114378
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_07114369
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_07114A42
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_07115130
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_07113851
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_071158F8
    Source: iGZtra5EaP.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: eBopYzBwUYOW.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: dhcpmon.exe.12.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: iGZtra5EaP.exeBinary or memory string: OriginalFilename vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 00000000.00000002.294056271.0000000002F9F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameResource_Meter.dll> vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 00000000.00000002.302493562.000000000EA00000.00000002.00000001.sdmpBinary or memory string: originalfilename vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 00000000.00000002.302493562.000000000EA00000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 00000000.00000002.300051492.0000000007670000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 00000000.00000002.294511650.0000000003CC9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameIpTl.exe( vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 00000000.00000002.294511650.0000000003CC9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 00000000.00000002.302136335.000000000E910000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exeBinary or memory string: OriginalFilename vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.480906806.00000000068E0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.479435381.00000000059A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000002.470898373.00000000018E0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000000C.00000000.292068443.0000000000EF2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIpTl.exe( vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exeBinary or memory string: OriginalFilename vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 00000011.00000002.408352281.00000000070B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 00000011.00000002.398277931.0000000002B51000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 00000011.00000002.399298004.0000000002E2F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameResource_Meter.dll> vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 00000011.00000000.303701249.0000000000632000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIpTl.exe( vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 00000011.00000002.410906313.000000000E310000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 00000011.00000002.396930695.0000000000D5A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 00000011.00000002.408776484.0000000007150000.00000002.00000001.sdmpBinary or memory string: originalfilename vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 00000011.00000002.408776484.0000000007150000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000001B.00000002.417862891.0000000002A11000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000001B.00000002.417862891.0000000002A11000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000001B.00000000.394808398.0000000000522000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIpTl.exe( vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exe, 0000001B.00000002.418018556.0000000003A19000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exeBinary or memory string: OriginalFilenameIpTl.exe( vs iGZtra5EaP.exe
    Source: iGZtra5EaP.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Source: 12.2.iGZtra5EaP.exe.6de0000.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6de0000.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.6e10000.38.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6e10000.38.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 33.2.dhcpmon.exe.3009684.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 33.2.dhcpmon.exe.3009684.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.6760000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6760000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 30.2.dhcpmon.exe.4060614.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 30.2.dhcpmon.exe.4060614.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 27.2.iGZtra5EaP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 27.2.iGZtra5EaP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 27.2.iGZtra5EaP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 27.2.iGZtra5EaP.exe.3a64c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 27.2.iGZtra5EaP.exe.3a64c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.6e40000.40.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6e40000.40.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 17.2.iGZtra5EaP.exe.3b59930.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 17.2.iGZtra5EaP.exe.3b59930.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 17.2.iGZtra5EaP.exe.3b59930.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 20.2.dhcpmon.exe.4149930.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 20.2.dhcpmon.exe.4149930.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.44d4c3d.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.44d4c3d.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.69d4629.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.69d4629.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.6e54c9f.43.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6e54c9f.43.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 33.2.dhcpmon.exe.3ff0614.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 33.2.dhcpmon.exe.3ff0614.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.6e90000.44.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6e90000.44.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.6e10000.38.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6e10000.38.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 30.2.dhcpmon.exe.405b7de.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 30.2.dhcpmon.exe.405b7de.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 30.2.dhcpmon.exe.405b7de.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.37e1a28.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.37e1a28.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.37e1a28.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.37cd3a8.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.37cd3a8.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.6dd0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6dd0000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.448e778.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.448e778.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.34b6ba0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.34b6ba0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.6e20000.39.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6e20000.39.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 30.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 30.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 30.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.1ad0000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.1ad0000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 33.2.dhcpmon.exe.3feb7de.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 33.2.dhcpmon.exe.3feb7de.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 33.2.dhcpmon.exe.3feb7de.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.48fc66c.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.48fc66c.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.470d0e9.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.470d0e9.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.69d0000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.69d0000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.353c47c.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.353c47c.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.353c47c.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.48e3e40.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.48e3e40.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 18.2.dhcpmon.exe.4099930.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 18.2.dhcpmon.exe.4099930.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.6db0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6db0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.69d0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.69d0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.4492da1.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.4492da1.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.4553c80.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.4553c80.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.4553c80.19.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.44d0614.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.44d0614.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 27.2.iGZtra5EaP.exe.3a60614.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 27.2.iGZtra5EaP.exe.3a60614.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 20.2.dhcpmon.exe.4149930.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 20.2.dhcpmon.exe.4149930.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 20.2.dhcpmon.exe.4149930.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.6e5e8a4.41.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6e5e8a4.41.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 27.2.iGZtra5EaP.exe.3a5b7de.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 27.2.iGZtra5EaP.exe.3a5b7de.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 27.2.iGZtra5EaP.exe.3a5b7de.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 30.2.dhcpmon.exe.3079684.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 30.2.dhcpmon.exe.3079684.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 27.2.iGZtra5EaP.exe.2a7956c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 27.2.iGZtra5EaP.exe.2a7956c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.6df0000.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6df0000.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.6e20000.39.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6e20000.39.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.1ad0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.1ad0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 30.2.dhcpmon.exe.4064c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 30.2.dhcpmon.exe.4064c3d.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.6e00000.37.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6e00000.37.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.6e90000.44.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6e90000.44.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.6e40000.40.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6e40000.40.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.6e00000.37.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6e00000.37.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.4489942.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.4489942.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.4489942.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.454ee4a.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.454ee4a.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.454ee4a.18.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.4553c80.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.4553c80.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.6760000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6760000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.353c47c.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.353c47c.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.44cb7de.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.44cb7de.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.44cb7de.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 27.2.iGZtra5EaP.exe.3a60614.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 27.2.iGZtra5EaP.exe.3a60614.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.48e3e40.25.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 33.2.dhcpmon.exe.3ff4c3d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 33.2.dhcpmon.exe.3ff4c3d.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.448e778.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.448e778.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.45582a9.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.45582a9.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.45582a9.17.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.35486f8.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.35486f8.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 18.2.dhcpmon.exe.4099930.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 18.2.dhcpmon.exe.4099930.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 18.2.dhcpmon.exe.4099930.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.37c111c.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.37c111c.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 30.2.dhcpmon.exe.4060614.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 30.2.dhcpmon.exe.4060614.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 33.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 33.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 33.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 33.2.dhcpmon.exe.3ff0614.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 33.2.dhcpmon.exe.3ff0614.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.471931d.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.471931d.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.5ec0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.5ec0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.35486f8.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.35486f8.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.35486f8.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.iGZtra5EaP.exe.3cc9930.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.iGZtra5EaP.exe.3cc9930.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0.2.iGZtra5EaP.exe.3cc9930.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.iGZtra5EaP.exe.3cfc550.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.iGZtra5EaP.exe.3cfc550.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.6e50000.42.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6e50000.42.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.6dd0000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6dd0000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.6e50000.42.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6e50000.42.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.355cd68.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.355cd68.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.355cd68.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.6df0000.36.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.6df0000.36.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.37c111c.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.37c111c.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.37c111c.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.44d0614.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.44d0614.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.48fc66c.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.48fc66c.23.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0.2.iGZtra5EaP.exe.3cc9930.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.iGZtra5EaP.exe.3cc9930.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 17.2.iGZtra5EaP.exe.3b59930.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 17.2.iGZtra5EaP.exe.3b59930.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.37cd3a8.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.37cd3a8.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 12.2.iGZtra5EaP.exe.37cd3a8.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.471931d.20.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.48e8469.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 12.2.iGZtra5EaP.exe.48e8469.24.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.472d94a.22.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 12.2.iGZtra5EaP.exe.470d0e9.21.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000001B.00000002.417862891.0000000002A11000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000C.00000002.482078580.0000000006E40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000C.00000002.482078580.0000000006E40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000021.00000002.428437498.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000021.00000002.428437498.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000C.00000002.476961664.000000000454E000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000C.00000002.482179100.0000000006E90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000C.00000002.482179100.0000000006E90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0000000C.00000002.471078718.0000000001AD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000C.00000002.471078718.0000000001AD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000014.00000002.412689646.0000000004149000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000014.00000002.412689646.0000000004149000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000C.00000002.475401082.000000000374C000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000C.00000002.481910813.0000000006DB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000C.00000002.481910813.0000000006DB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0000000C.00000002.481995550.0000000006E00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000C.00000002.481995550.0000000006E00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0000001E.00000002.422052368.0000000003011000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000001E.00000002.417477798.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000001E.00000002.417477798.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000021.00000002.431850871.0000000003FA9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000C.00000002.481497763.00000000069D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000C.00000002.481497763.00000000069D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0000000C.00000002.482020693.0000000006E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000C.00000002.482020693.0000000006E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0000000C.00000002.481961618.0000000006DE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000C.00000002.481961618.0000000006DE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0000000C.00000002.481945946.0000000006DD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000C.00000002.481945946.0000000006DD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000012.00000002.404628541.0000000004099000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000012.00000002.404628541.0000000004099000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000C.00000002.467302367.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000C.00000002.467302367.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000C.00000002.482036750.0000000006E20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000C.00000002.482036750.0000000006E20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0000000C.00000002.473787584.00000000034F7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000001B.00000002.415827598.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000001B.00000002.415827598.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000C.00000002.480093816.0000000005EC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000C.00000002.480093816.0000000005EC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0000000C.00000002.482102080.0000000006E50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000C.00000002.482102080.0000000006E50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0000000C.00000002.477941629.00000000048DF000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000002.294511650.0000000003CC9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000000.00000002.294511650.0000000003CC9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000C.00000002.480306697.0000000006760000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000C.00000002.480306697.0000000006760000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0000000C.00000002.476599395.00000000044C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000011.00000002.400817271.0000000003B59000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000011.00000002.400817271.0000000003B59000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000001B.00000002.418018556.0000000003A19000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000001E.00000002.423536148.0000000004019000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000C.00000002.476392070.0000000004481000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000C.00000002.481978911.0000000006DF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0000000C.00000002.481978911.0000000006DF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000021.00000002.431679291.0000000002FA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: iGZtra5EaP.exe PID: 5832, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: iGZtra5EaP.exe PID: 5832, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: iGZtra5EaP.exe PID: 4720, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: iGZtra5EaP.exe PID: 4720, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: iGZtra5EaP.exe PID: 5016, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: iGZtra5EaP.exe PID: 5016, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: dhcpmon.exe PID: 3008, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: dhcpmon.exe PID: 3008, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: dhcpmon.exe PID: 5200, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: dhcpmon.exe PID: 5200, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: iGZtra5EaP.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: eBopYzBwUYOW.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: dhcpmon.exe.12.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: 12.2.iGZtra5EaP.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 12.2.iGZtra5EaP.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 12.2.iGZtra5EaP.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 27.2.iGZtra5EaP.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 27.2.iGZtra5EaP.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 27.2.iGZtra5EaP.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 30.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 30.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 30.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 12.2.iGZtra5EaP.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 12.2.iGZtra5EaP.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 27.2.iGZtra5EaP.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 27.2.iGZtra5EaP.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 33.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 33.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 30.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 30.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: classification engineClassification label: mal100.troj.evad.winEXE@30/15@7/2
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeFile created: C:\Users\user\AppData\Roaming\eBopYzBwUYOW.exeJump to behavior
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{f0d143be-967c-4293-98d3-3a1e128b5398}
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5896:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2588:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5096:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:256:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1324:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5072:120:WilError_01
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeFile created: C:\Users\user\AppData\Local\Temp\tmp3997.tmpJump to behavior
    Source: iGZtra5EaP.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: iGZtra5EaP.exeVirustotal: Detection: 48%
    Source: iGZtra5EaP.exeReversingLabs: Detection: 64%
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeFile read: C:\Users\user\Desktop\iGZtra5EaP.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\iGZtra5EaP.exe 'C:\Users\user\Desktop\iGZtra5EaP.exe'
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmp3997.tmp'
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess created: C:\Users\user\Desktop\iGZtra5EaP.exe {path}
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp489A.tmp'
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp4CC2.tmp'
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Users\user\Desktop\iGZtra5EaP.exe C:\Users\user\Desktop\iGZtra5EaP.exe 0
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmpF219.tmp'
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess created: C:\Users\user\Desktop\iGZtra5EaP.exe {path}
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmpF5E2.tmp'
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmp63D.tmp'
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmp3997.tmp'
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess created: C:\Users\user\Desktop\iGZtra5EaP.exe {path}
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp489A.tmp'
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp4CC2.tmp'
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmpF219.tmp'
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess created: C:\Users\user\Desktop\iGZtra5EaP.exe {path}
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmpF5E2.tmp'
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmp63D.tmp'
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
    Source: iGZtra5EaP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: iGZtra5EaP.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp

    Data Obfuscation:

    barindex
    .NET source code contains potential unpackerShow sources
    Source: 12.2.iGZtra5EaP.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 12.2.iGZtra5EaP.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 27.2.iGZtra5EaP.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 27.2.iGZtra5EaP.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 30.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 30.2.dhcpmon.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 33.2.dhcpmon.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 33.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 0_2_009585A5 push edx; iretd
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 0_2_00954664 push dword ptr [edx+ebx*2+20h]; ret
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_00EF85A5 push edx; iretd
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_00EF4664 push dword ptr [edx+ebx*2+20h]; ret
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DCD61F push es; retf
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DCD61B push es; retf
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DCD603 push es; retf
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DCD633 push es; retf
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DCD62F push es; retf
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DCD62B push es; retf
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DCD627 push es; retf
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DCD623 push es; retf
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DCD4FF push es; retf
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DCD4FB push es; retf
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DCD467 push es; retf
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DCD463 push es; retf
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DCD597 push es; retf
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DCD5B7 push es; retf
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DCD3C7 push es; ret
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DCD3C3 push es; ret
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 12_2_06DCCD42 push 8B000005h; retf
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_00634664 push dword ptr [edx+ebx*2+20h]; ret
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_006385A5 push edx; iretd
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_050D806D pushad ; retf
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_050D8A30 push C58FBA62h; ret
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_00C685A5 push edx; iretd
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_00C64664 push dword ptr [edx+ebx*2+20h]; ret
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_0565806D pushad ; retf
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_05658A30 push C58FBA62h; ret
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_07117E80 push esp; ret
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 18_2_0711981D pushad ; iretd
    Source: initial sampleStatic PE information: section name: .text entropy: 7.50200224495
    Source: initial sampleStatic PE information: section name: .text entropy: 7.50200224495
    Source: initial sampleStatic PE information: section name: .text entropy: 7.50200224495
    Source: 12.2.iGZtra5EaP.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 12.2.iGZtra5EaP.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 27.2.iGZtra5EaP.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 27.2.iGZtra5EaP.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 30.2.dhcpmon.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 30.2.dhcpmon.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 33.2.dhcpmon.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 33.2.dhcpmon.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeFile created: C:\Users\user\AppData\Roaming\eBopYzBwUYOW.exeJump to dropped file

    Boot Survival:

    barindex
    Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmp3997.tmp'

    Hooking and other Techniques for Hiding and Protection:

    barindex
    Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeFile opened: C:\Users\user\Desktop\iGZtra5EaP.exe:Zone.Identifier read attributes | delete
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion:

    barindex
    Yara detected AntiVM3Show sources
    Source: Yara matchFile source: 00000014.00000002.411142657.0000000003141000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000011.00000002.398277931.0000000002B51000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.293558443.0000000002CC1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000012.00000002.400511596.0000000003091000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: iGZtra5EaP.exe PID: 5832, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: iGZtra5EaP.exe PID: 1288, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 496, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5756, type: MEMORYSTR
    Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)Show sources
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeWMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeWMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
    Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
    Source: iGZtra5EaP.exe, 00000000.00000002.293558443.0000000002CC1000.00000004.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.398277931.0000000002B51000.00000004.00000001.sdmp, dhcpmon.exe, 00000012.00000002.400511596.0000000003091000.00000004.00000001.sdmp, dhcpmon.exe, 00000014.00000002.411142657.0000000003141000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
    Source: iGZtra5EaP.exe, 00000000.00000002.293558443.0000000002CC1000.00000004.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.398277931.0000000002B51000.00000004.00000001.sdmp, dhcpmon.exe, 00000012.00000002.400511596.0000000003091000.00000004.00000001.sdmp, dhcpmon.exe, 00000014.00000002.411142657.0000000003141000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: Identifier
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum name: 0
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeWindow / User API: threadDelayed 2413
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeWindow / User API: threadDelayed 6764
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeWindow / User API: foregroundWindowGot 567
    Source: C:\Users\user\Desktop\iGZtra5EaP.exe TID: 1636Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Users\user\Desktop\iGZtra5EaP.exe TID: 1200Thread sleep time: -12912720851596678s >= -30000s
    Source: C:\Users\user\Desktop\iGZtra5EaP.exe TID: 3868Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1180Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5896Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Users\user\Desktop\iGZtra5EaP.exe TID: 6004Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1928Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5480Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: dhcpmon.exe, 00000014.00000002.427212461.000000000E4C0000.00000004.00000001.sdmpBinary or memory string: VMware
    Source: dhcpmon.exe, 00000014.00000002.411142657.0000000003141000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
    Source: iGZtra5EaP.exe, 0000000C.00000002.470898373.00000000018E0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
    Source: dhcpmon.exe, 00000014.00000002.411142657.0000000003141000.00000004.00000001.sdmpBinary or memory string: vmware
    Source: iGZtra5EaP.exe, 00000000.00000002.301129173.0000000008C30000.00000004.00000001.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMware3TV9F2PNWin32_VideoControllerXYX6N6Y_VideoController120060621000000.000000-00087424060disp
    Source: dhcpmon.exe, 00000014.00000002.411142657.0000000003141000.00000004.00000001.sdmpBinary or memory string: l%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
    Source: dhcpmon.exe, 00000014.00000002.411142657.0000000003141000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
    Source: dhcpmon.exe, 00000014.00000002.411142657.0000000003141000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
    Source: dhcpmon.exe, 00000014.00000002.427212461.000000000E4C0000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SAE
    Source: dhcpmon.exe, 00000014.00000002.411142657.0000000003141000.00000004.00000001.sdmpBinary or memory string: VMWARE
    Source: dhcpmon.exe, 00000014.00000002.411142657.0000000003141000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
    Source: dhcpmon.exe, 00000014.00000002.427212461.000000000E4C0000.00000004.00000001.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMware3TV9F2PNWin32_VideoControllerXYX6N6Y_VideoController120060621000000.000000-00087424060display.infMSBDAU1H7SVAXPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsK9WOH_X5
    Source: iGZtra5EaP.exe, 0000000C.00000002.470898373.00000000018E0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
    Source: iGZtra5EaP.exe, 00000000.00000002.301129173.0000000008C30000.00000004.00000001.sdmpBinary or memory string: ontroller(Standard display types)VMware3TV9F2PNWin32_VideoControllerXYX6N6Y_VideoController120060621000000.000000-00087424060display.infMSBDAU1H7SVAXPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsK9WOH_X5Hy
    Source: iGZtra5EaP.exe, 0000000C.00000002.470898373.00000000018E0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
    Source: dhcpmon.exe, 00000014.00000002.411142657.0000000003141000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
    Source: dhcpmon.exe, 00000014.00000002.411142657.0000000003141000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
    Source: dhcpmon.exe, 00000012.00000002.413353329.00000000088D0000.00000004.00000001.sdmpBinary or memory string: y types)VMware3TV9F2PNWin32_VideoControllerXYX6N6Y_Vid=
    Source: dhcpmon.exe, 00000014.00000002.411142657.0000000003141000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
    Source: dhcpmon.exe, 00000014.00000002.411142657.0000000003141000.00000004.00000001.sdmpBinary or memory string: l"SOFTWARE\VMware, Inc.\VMware Tools
    Source: iGZtra5EaP.exe, 0000000C.00000002.470898373.00000000018E0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess information queried: ProcessInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeMemory allocated: page read and write | page guard

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    Injects a PE file into a foreign processesShow sources
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeMemory written: C:\Users\user\Desktop\iGZtra5EaP.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeMemory written: C:\Users\user\Desktop\iGZtra5EaP.exe base: 400000 value starts with: 4D5A
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmp3997.tmp'
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess created: C:\Users\user\Desktop\iGZtra5EaP.exe {path}
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp489A.tmp'
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp4CC2.tmp'
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmpF219.tmp'
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeProcess created: C:\Users\user\Desktop\iGZtra5EaP.exe {path}
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmpF5E2.tmp'
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmp63D.tmp'
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
    Source: iGZtra5EaP.exe, 0000000C.00000002.474203989.00000000035BC000.00000004.00000001.sdmpBinary or memory string: Program Manager
    Source: iGZtra5EaP.exe, 0000000C.00000002.471140321.0000000001E70000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: iGZtra5EaP.exe, 0000000C.00000002.471140321.0000000001E70000.00000002.00000001.sdmpBinary or memory string: Progman
    Source: iGZtra5EaP.exe, 0000000C.00000002.475401082.000000000374C000.00000004.00000001.sdmpBinary or memory string: Program ManagerP%"D
    Source: iGZtra5EaP.exe, 0000000C.00000002.474203989.00000000035BC000.00000004.00000001.sdmpBinary or memory string: Program Managerx
    Source: iGZtra5EaP.exe, 0000000C.00000002.471140321.0000000001E70000.00000002.00000001.sdmpBinary or memory string: Progmanlock
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Users\user\Desktop\iGZtra5EaP.exe VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Users\user\Desktop\iGZtra5EaP.exe VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Users\user\Desktop\iGZtra5EaP.exe VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Users\user\Desktop\iGZtra5EaP.exe VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeCode function: 17_2_084B90D8 GetUserNameA,
    Source: C:\Users\user\Desktop\iGZtra5EaP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

    Stealing of Sensitive Information:

    barindex
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 30.2.dhcpmon.exe.4060614.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.3a64c3d.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 17.2.iGZtra5EaP.exe.3b59930.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 20.2.dhcpmon.exe.4149930.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.44d4c3d.15.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.69d4629.30.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3ff0614.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 30.2.dhcpmon.exe.405b7de.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.448e778.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 30.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3feb7de.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.69d0000.31.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.48e3e40.25.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.4099930.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.69d0000.31.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.4492da1.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.4553c80.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.44d0614.14.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.3a60614.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 20.2.dhcpmon.exe.4149930.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.3a5b7de.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 30.2.dhcpmon.exe.4064c3d.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.4489942.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.454ee4a.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.4553c80.19.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.44cb7de.16.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.3a60614.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.48e3e40.25.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3ff4c3d.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.448e778.11.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.45582a9.17.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.4099930.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 30.2.dhcpmon.exe.4060614.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3ff0614.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.iGZtra5EaP.exe.3cc9930.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.iGZtra5EaP.exe.3cfc550.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.44d0614.14.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.iGZtra5EaP.exe.3cc9930.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 17.2.iGZtra5EaP.exe.3b59930.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.471931d.20.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.48e8469.24.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.472d94a.22.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.470d0e9.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000001B.00000002.417862891.0000000002A11000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000021.00000002.428437498.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.476961664.000000000454E000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000014.00000002.412689646.0000000004149000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001E.00000002.422052368.0000000003011000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001E.00000002.417477798.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000021.00000002.431850871.0000000003FA9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.481497763.00000000069D0000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000012.00000002.404628541.0000000004099000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.467302367.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.415827598.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.477941629.00000000048DF000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.294511650.0000000003CC9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.476599395.00000000044C9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000011.00000002.400817271.0000000003B59000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.418018556.0000000003A19000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001E.00000002.423536148.0000000004019000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.476392070.0000000004481000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000021.00000002.431679291.0000000002FA1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.472713339.0000000003481000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: iGZtra5EaP.exe PID: 5832, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: iGZtra5EaP.exe PID: 4720, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: iGZtra5EaP.exe PID: 5016, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3008, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5200, type: MEMORYSTR

    Remote Access Functionality:

    barindex
    Detected Nanocore RatShow sources
    Source: iGZtra5EaP.exe, 00000000.00000002.294511650.0000000003CC9000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: iGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: iGZtra5EaP.exe, 0000001B.00000002.417862891.0000000002A11000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: iGZtra5EaP.exe, 0000001B.00000002.417862891.0000000002A11000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: dhcpmon.exe, 0000001E.00000002.422052368.0000000003011000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 0000001E.00000002.422052368.0000000003011000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: dhcpmon.exe, 00000021.00000002.428437498.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 00000021.00000002.431850871.0000000003FA9000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 30.2.dhcpmon.exe.4060614.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.3a64c3d.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 17.2.iGZtra5EaP.exe.3b59930.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 20.2.dhcpmon.exe.4149930.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.44d4c3d.15.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.69d4629.30.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3ff0614.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 30.2.dhcpmon.exe.405b7de.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.448e778.11.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 30.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3feb7de.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.69d0000.31.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.48e3e40.25.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.4099930.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.69d0000.31.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.4492da1.12.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.4553c80.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.44d0614.14.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.3a60614.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 20.2.dhcpmon.exe.4149930.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.3a5b7de.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 30.2.dhcpmon.exe.4064c3d.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.4489942.13.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.454ee4a.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.4553c80.19.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.44cb7de.16.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 27.2.iGZtra5EaP.exe.3a60614.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.48e3e40.25.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3ff4c3d.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.448e778.11.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.45582a9.17.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 18.2.dhcpmon.exe.4099930.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 30.2.dhcpmon.exe.4060614.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 33.2.dhcpmon.exe.3ff0614.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.iGZtra5EaP.exe.3cc9930.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.iGZtra5EaP.exe.3cfc550.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.44d0614.14.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.iGZtra5EaP.exe.3cc9930.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 17.2.iGZtra5EaP.exe.3b59930.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.471931d.20.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.48e8469.24.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.472d94a.22.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 12.2.iGZtra5EaP.exe.470d0e9.21.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000001B.00000002.417862891.0000000002A11000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000021.00000002.428437498.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.476961664.000000000454E000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000014.00000002.412689646.0000000004149000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001E.00000002.422052368.0000000003011000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001E.00000002.417477798.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000021.00000002.431850871.0000000003FA9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.481497763.00000000069D0000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000012.00000002.404628541.0000000004099000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.467302367.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.415827598.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.477941629.00000000048DF000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.294511650.0000000003CC9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.476599395.00000000044C9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000011.00000002.400817271.0000000003B59000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001B.00000002.418018556.0000000003A19000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000001E.00000002.423536148.0000000004019000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.476392070.0000000004481000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000021.00000002.431679291.0000000002FA1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000C.00000002.472713339.0000000003481000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: iGZtra5EaP.exe PID: 5832, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: iGZtra5EaP.exe PID: 4720, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: iGZtra5EaP.exe PID: 5016, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3008, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5200, type: MEMORYSTR

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Process Injection112Masquerading2Input Capture11Security Software Discovery311Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion131Security Account ManagerVirtualization/Sandbox Evasion131SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information3DCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemSystem Information Discovery12Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 458908 Sample: iGZtra5EaP.exe Startdate: 03/08/2021 Architecture: WINDOWS Score: 100 66 backupnew.duckdns.org 2->66 72 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->72 74 Multi AV Scanner detection for domain / URL 2->74 76 Found malware configuration 2->76 78 14 other signatures 2->78 9 iGZtra5EaP.exe 6 2->9         started        13 dhcpmon.exe 5 2->13         started        15 iGZtra5EaP.exe 4 2->15         started        17 dhcpmon.exe 2->17         started        signatures3 process4 file5 60 C:\Users\user\AppData\...\eBopYzBwUYOW.exe, PE32 9->60 dropped 62 C:\Users\user\AppData\Local\...\tmp3997.tmp, XML 9->62 dropped 64 C:\Users\user\AppData\...\iGZtra5EaP.exe.log, ASCII 9->64 dropped 82 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 9->82 84 Uses schtasks.exe or at.exe to add and modify task schedules 9->84 86 Injects a PE file into a foreign processes 9->86 19 iGZtra5EaP.exe 1 14 9->19         started        24 schtasks.exe 1 9->24         started        26 schtasks.exe 13->26         started        28 dhcpmon.exe 13->28         started        30 schtasks.exe 15->30         started        32 iGZtra5EaP.exe 15->32         started        34 schtasks.exe 17->34         started        36 dhcpmon.exe 17->36         started        signatures6 process7 dnsIp8 68 backupnew.duckdns.org 20.197.234.75, 1177, 49737, 49743 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 19->68 70 microsoftsecurity.sytes.net 20.206.66.33, 1177 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 19->70 54 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->54 dropped 56 C:\Users\user\AppData\Roaming\...\run.dat, ATSC 19->56 dropped 58 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 19->58 dropped 80 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->80 38 schtasks.exe 1 19->38         started        40 schtasks.exe 1 19->40         started        42 conhost.exe 24->42         started        44 conhost.exe 26->44         started        46 conhost.exe 30->46         started        48 conhost.exe 34->48         started        file9 signatures10 process11 process12 50 conhost.exe 38->50         started        52 conhost.exe 40->52         started       

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    iGZtra5EaP.exe49%VirustotalBrowse
    iGZtra5EaP.exe64%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
    iGZtra5EaP.exe100%Joe Sandbox ML

    Dropped Files

    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\eBopYzBwUYOW.exe100%Joe Sandbox ML
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe64%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
    C:\Users\user\AppData\Roaming\eBopYzBwUYOW.exe64%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

    Unpacked PE Files

    SourceDetectionScannerLabelLinkDownload
    27.2.iGZtra5EaP.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    30.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    12.2.iGZtra5EaP.exe.69d0000.31.unpack100%AviraTR/NanoCore.fadteDownload File
    12.2.iGZtra5EaP.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    33.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

    Domains

    SourceDetectionScannerLabelLink
    backupnew.duckdns.org9%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    microsoftsecurity.sytes.net9%VirustotalBrowse
    microsoftsecurity.sytes.net0%Avira URL Cloudsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    backupnew.duckdns.org9%VirustotalBrowse
    backupnew.duckdns.org0%Avira URL Cloudsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://douglasheriot.com/uno/0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    backupnew.duckdns.org
    20.197.234.75
    truetrueunknown
    microsoftsecurity.sytes.net
    20.206.66.33
    truefalse
      high

      Contacted URLs

      NameMaliciousAntivirus DetectionReputation
      microsoftsecurity.sytes.nettrue
      • 9%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      backupnew.duckdns.orgtrue
      • 9%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://www.apache.org/licenses/LICENSE-2.0iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
        high
        http://www.fontbureau.comiGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
          high
          http://www.fontbureau.com/designersGiGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
            high
            http://www.fontbureau.com/designers/?iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
              high
              http://www.founder.com.cn/cn/bTheiGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designers?iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                high
                http://www.tiro.comdhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designersdhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                  high
                  http://www.goodfont.co.kriGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://google.comiGZtra5EaP.exe, 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmpfalse
                    high
                    http://www.carterandcone.comliGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.comiGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.typography.netDiGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/cabarga.htmlNiGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/cTheiGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htmiGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://fontfabrik.comiGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cniGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/frere-jones.htmliGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                        high
                        http://douglasheriot.com/uno/iGZtra5EaP.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/DPleaseiGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers8iGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                          high
                          http://www.fonts.comiGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                            high
                            http://www.sandoll.co.kriGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.deDPleaseiGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cniGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameiGZtra5EaP.exe, 00000000.00000002.293558443.0000000002CC1000.00000004.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.398277931.0000000002B51000.00000004.00000001.sdmp, dhcpmon.exe, 00000012.00000002.400511596.0000000003091000.00000004.00000001.sdmp, dhcpmon.exe, 00000014.00000002.411142657.0000000003141000.00000004.00000001.sdmpfalse
                              high
                              http://www.sakkal.comiGZtra5EaP.exe, 00000000.00000002.298590445.0000000005D20000.00000002.00000001.sdmp, iGZtra5EaP.exe, 00000011.00000002.405976014.0000000005B70000.00000002.00000001.sdmp, dhcpmon.exe, 00000012.00000002.409652849.00000000060D0000.00000002.00000001.sdmp, dhcpmon.exe, 00000014.00000002.418390500.00000000060E0000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              20.206.66.33
                              microsoftsecurity.sytes.netUnited States
                              8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                              20.197.234.75
                              backupnew.duckdns.orgUnited States
                              8075MICROSOFT-CORP-MSN-AS-BLOCKUStrue

                              General Information

                              Joe Sandbox Version:33.0.0 White Diamond
                              Analysis ID:458908
                              Start date:03.08.2021
                              Start time:21:11:20
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 13m 2s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:iGZtra5EaP.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:43
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@30/15@7/2
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 0.8% (good quality ratio 0.5%)
                              • Quality average: 40.1%
                              • Quality standard deviation: 36.9%
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                              • TCP Packets have been reduced to 100
                              • Excluded IPs from analysis (whitelisted): 13.64.90.137, 104.42.151.234, 168.61.161.212, 20.82.210.154, 23.35.236.56, 173.222.108.226, 173.222.108.210, 80.67.82.235, 80.67.82.211, 20.50.102.62, 23.211.6.115, 40.112.88.60
                              • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net
                              • Not all processes where analyzed, report is missing behavior information
                              • Report creation exceeded maximum time and may have missing disassembly code information.
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              21:12:54AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              21:12:55API Interceptor653x Sleep call for process: iGZtra5EaP.exe modified
                              21:12:56Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\iGZtra5EaP.exe" s>$(Arg0)
                              21:12:56Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)

                              Joe Sandbox View / Context

                              IPs

                              No context

                              Domains

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              backupnew.duckdns.orgy7PKSDpFe0.exeGet hashmaliciousBrowse
                              • 191.177.183.137

                              ASN

                              No context

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              No context

                              Created / dropped Files

                              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Process:C:\Users\user\Desktop\iGZtra5EaP.exe
                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):788480
                              Entropy (8bit):7.405761902599822
                              Encrypted:false
                              SSDEEP:24576:K+J70cLvBwP+8oUSmntIV+60wST8OQpi:KK70qvFISLZ5I3
                              MD5:5ABFC84B2A671617A4930A61E218B6C6
                              SHA1:FB2E5175272B90AA204853DD2BA2DC175FF5958F
                              SHA-256:776E6E841B2A1B1DACD2BEB12F76949DC9A395A45BD7107475D90B60F09E5F39
                              SHA-512:64A5E3C121442007176DE090B4F24FBB7FFE0018BB774431D70B4941EFE9264E23349CF0A83750BEAE6172E05D30C9CBAAFD542F74FA22EDFEE190DD7515DF36
                              Malicious:true
                              Antivirus:
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 64%
                              Reputation:unknown
                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....].`.................x..........^.... ........@.. .......................`............@.....................................O............................@....................................................... ............... ..H............text...dw... ...x.................. ..`.rsrc................z..............@..@.reloc.......@......................@..B................@.......H......................0...._...........................................0..........*....0..............s....(.....*.0...........(.....*.0............}......}.....(.........}........(...s'...}.......}......}.....u....,9..o.......(....r...p(....-...o.......(....r...p(....+..+....,...t....s0........}....*.0..I...............(.... N... !l..a%..^E................+.... ...Z ..a+....}....*....0..E........ q[0. ..L.a%..^E............#...+!....$...s#...}..... .(.+Z ]r..a+.*....0..
                              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                              Process:C:\Users\user\Desktop\iGZtra5EaP.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):26
                              Entropy (8bit):3.95006375643621
                              Encrypted:false
                              SSDEEP:3:ggPYV:rPYV
                              MD5:187F488E27DB4AF347237FE461A079AD
                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                              Malicious:true
                              Reputation:unknown
                              Preview: [ZoneTransfer]....ZoneId=0
                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1308
                              Entropy (8bit):5.345811588615766
                              Encrypted:false
                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                              MD5:2E016B886BDB8389D2DD0867BE55F87B
                              SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                              SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                              SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                              Malicious:false
                              Reputation:unknown
                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\iGZtra5EaP.exe.log
                              Process:C:\Users\user\Desktop\iGZtra5EaP.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1308
                              Entropy (8bit):5.345811588615766
                              Encrypted:false
                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                              MD5:2E016B886BDB8389D2DD0867BE55F87B
                              SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                              SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                              SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                              Malicious:true
                              Reputation:unknown
                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                              C:\Users\user\AppData\Local\Temp\tmp3997.tmp
                              Process:C:\Users\user\Desktop\iGZtra5EaP.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1645
                              Entropy (8bit):5.197051255242617
                              Encrypted:false
                              SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBpFtn:cbh47TlNQ//rydbz9I3YODOLNdq3nv
                              MD5:F100F4090A302E04A4E5584333049320
                              SHA1:69E6D2690B5E7D9BAFD8D69FF8D9ABEA0C34AC01
                              SHA-256:A9DFF35D768ED46D311434A85F8BFF2F1B7D02160E6FCE7EFB8A579C90E02BB0
                              SHA-512:CF0A3368A7A96FFD4A6DE947120BB61CA61C751DB91458BA4DC77EF2836B1D44E4AD3E464EB21FFD82AE9B1A17196545C09D196DE8D30A1716F3830499077430
                              Malicious:true
                              Reputation:unknown
                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                              C:\Users\user\AppData\Local\Temp\tmp489A.tmp
                              Process:C:\Users\user\Desktop\iGZtra5EaP.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1300
                              Entropy (8bit):5.108613782269879
                              Encrypted:false
                              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0zgLrxtn:cbk4oL600QydbQxIYODOLedq3Lvj
                              MD5:73882135D094B9C109522AE7A7FB03A0
                              SHA1:8455954767A1F42B6393ADCB5CA25E96CA467D7B
                              SHA-256:9AD453C7A4F46761E71DC36D48B953E8A8818299E599528545284311EE94C7FF
                              SHA-512:9785A28A920F0964EE37087EF8D6C17CC432F982EF88A684CFEA3261BE9CC01B6D89C67E2F631E50615416786E8D6A36AA8264C9086A0883C90E698B5BCA387B
                              Malicious:false
                              Reputation:unknown
                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                              C:\Users\user\AppData\Local\Temp\tmp4CC2.tmp
                              Process:C:\Users\user\Desktop\iGZtra5EaP.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1310
                              Entropy (8bit):5.109425792877704
                              Encrypted:false
                              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                              MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                              SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                              SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                              SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                              Malicious:false
                              Reputation:unknown
                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                              C:\Users\user\AppData\Local\Temp\tmp63D.tmp
                              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1645
                              Entropy (8bit):5.197051255242617
                              Encrypted:false
                              SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBpFtn:cbh47TlNQ//rydbz9I3YODOLNdq3nv
                              MD5:F100F4090A302E04A4E5584333049320
                              SHA1:69E6D2690B5E7D9BAFD8D69FF8D9ABEA0C34AC01
                              SHA-256:A9DFF35D768ED46D311434A85F8BFF2F1B7D02160E6FCE7EFB8A579C90E02BB0
                              SHA-512:CF0A3368A7A96FFD4A6DE947120BB61CA61C751DB91458BA4DC77EF2836B1D44E4AD3E464EB21FFD82AE9B1A17196545C09D196DE8D30A1716F3830499077430
                              Malicious:false
                              Reputation:unknown
                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                              C:\Users\user\AppData\Local\Temp\tmpF219.tmp
                              Process:C:\Users\user\Desktop\iGZtra5EaP.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1645
                              Entropy (8bit):5.197051255242617
                              Encrypted:false
                              SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBpFtn:cbh47TlNQ//rydbz9I3YODOLNdq3nv
                              MD5:F100F4090A302E04A4E5584333049320
                              SHA1:69E6D2690B5E7D9BAFD8D69FF8D9ABEA0C34AC01
                              SHA-256:A9DFF35D768ED46D311434A85F8BFF2F1B7D02160E6FCE7EFB8A579C90E02BB0
                              SHA-512:CF0A3368A7A96FFD4A6DE947120BB61CA61C751DB91458BA4DC77EF2836B1D44E4AD3E464EB21FFD82AE9B1A17196545C09D196DE8D30A1716F3830499077430
                              Malicious:false
                              Reputation:unknown
                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                              C:\Users\user\AppData\Local\Temp\tmpF5E2.tmp
                              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1645
                              Entropy (8bit):5.197051255242617
                              Encrypted:false
                              SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBpFtn:cbh47TlNQ//rydbz9I3YODOLNdq3nv
                              MD5:F100F4090A302E04A4E5584333049320
                              SHA1:69E6D2690B5E7D9BAFD8D69FF8D9ABEA0C34AC01
                              SHA-256:A9DFF35D768ED46D311434A85F8BFF2F1B7D02160E6FCE7EFB8A579C90E02BB0
                              SHA-512:CF0A3368A7A96FFD4A6DE947120BB61CA61C751DB91458BA4DC77EF2836B1D44E4AD3E464EB21FFD82AE9B1A17196545C09D196DE8D30A1716F3830499077430
                              Malicious:false
                              Reputation:unknown
                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                              Process:C:\Users\user\Desktop\iGZtra5EaP.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):696
                              Entropy (8bit):7.089541637477408
                              Encrypted:false
                              SSDEEP:12:X4LEnybgCF0uCYKZr+dLEnybgCF0uCYKZr+dLEnybgCF0uCYKZr+K:IQnybgC4jh+dQnybgC4jh+dQnybgC4jp
                              MD5:AF6AA7C823112E2342E8D98BE5EDE0A9
                              SHA1:D48CA92F4FA11CC9619185563F2D57A6099D21D0
                              SHA-256:8D2ACD0CB78A2C690E2DCA1E9C92D273DAF4804DF0B4AC55E14D120C96F7671D
                              SHA-512:B822403E85339F4FF2D88608D73DA75A149756FF44454386E1EB2451A6CCCE0F65ECA596F95BBBAD942C963F8C4CA2ADE582D6E50750596DB263BA879FB3ECE1
                              Malicious:false
                              Reputation:unknown
                              Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&
                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                              Process:C:\Users\user\Desktop\iGZtra5EaP.exe
                              File Type:ATSC A/52 aka AC-3 aka Dolby Digital stream, reserved frequency,, emergency (E) 2 front/2 rear,
                              Category:dropped
                              Size (bytes):8
                              Entropy (8bit):3.0
                              Encrypted:false
                              SSDEEP:3:d:d
                              MD5:20522AD33E431199BB129A1CA16DC20F
                              SHA1:13C39E11506CDFEC1DB5466B527EB0FD330EA995
                              SHA-256:C21A5D95DEA000373611071378FFB0EA886D4ED3F351DF8B7F1622B81E159164
                              SHA-512:E49AD7E3542762FA4505433CC34A38175C6AD670D25D374104B3D7819F2162ABBA011B9AFD1181717A5FA80143EBEC7412653870F1C63713F2D88D7102BE8468
                              Malicious:true
                              Reputation:unknown
                              Preview: .wB!.V.H
                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                              Process:C:\Users\user\Desktop\iGZtra5EaP.exe
                              File Type:data
                              Category:modified
                              Size (bytes):327768
                              Entropy (8bit):7.999367066417797
                              Encrypted:true
                              SSDEEP:6144:oX44S90aTiB66x3PlZmqze1d1wI8lkWmtjJ/3Exi:LkjbU7LjGxi
                              MD5:2E52F446105FBF828E63CF808B721F9C
                              SHA1:5330E54F238F46DC04C1AC62B051DB4FCD7416FB
                              SHA-256:2F7479AA2661BD259747BC89106031C11B3A3F79F12190E7F19F5DF65B7C15C8
                              SHA-512:C08BA0E3315E2314ECBEF38722DF834C2CB8412446A9A310F41A8F83B4AC5984FCC1B26A1D8B0D58A730FDBDD885714854BDFD04DCDF7F582FC125F552D5C3CA
                              Malicious:false
                              Reputation:unknown
                              Preview: pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                              Process:C:\Users\user\Desktop\iGZtra5EaP.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):37
                              Entropy (8bit):4.337435460048129
                              Encrypted:false
                              SSDEEP:3:oNWXp5vMiZXEQgE1J:oNWXpFMgX5Br
                              MD5:6C946DFBF2EF9628FED080E3558D6822
                              SHA1:B3DF6F9B8483D7F991B1D45AD814E5411CBE9001
                              SHA-256:A82D2B0C7E89C7C267181AC684F6319F8EF28CAFD5A4BB4B8792DECB80AD7403
                              SHA-512:BF0E078002808DD32BFD4D8757857C64026C091647A79838B49D37F085377569E74D553872D0DB10FF6481958057FFF973EB257AC58F0EC43907004D627CC524
                              Malicious:false
                              Reputation:unknown
                              Preview: C:\Users\user\Desktop\iGZtra5EaP.exe
                              C:\Users\user\AppData\Roaming\eBopYzBwUYOW.exe
                              Process:C:\Users\user\Desktop\iGZtra5EaP.exe
                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):788480
                              Entropy (8bit):7.405761902599822
                              Encrypted:false
                              SSDEEP:24576:K+J70cLvBwP+8oUSmntIV+60wST8OQpi:KK70qvFISLZ5I3
                              MD5:5ABFC84B2A671617A4930A61E218B6C6
                              SHA1:FB2E5175272B90AA204853DD2BA2DC175FF5958F
                              SHA-256:776E6E841B2A1B1DACD2BEB12F76949DC9A395A45BD7107475D90B60F09E5F39
                              SHA-512:64A5E3C121442007176DE090B4F24FBB7FFE0018BB774431D70B4941EFE9264E23349CF0A83750BEAE6172E05D30C9CBAAFD542F74FA22EDFEE190DD7515DF36
                              Malicious:true
                              Antivirus:
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 64%
                              Reputation:unknown
                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....].`.................x..........^.... ........@.. .......................`............@.....................................O............................@....................................................... ............... ..H............text...dw... ...x.................. ..`.rsrc................z..............@..@.reloc.......@......................@..B................@.......H......................0...._...........................................0..........*....0..............s....(.....*.0...........(.....*.0............}......}.....(.........}........(...s'...}.......}......}.....u....,9..o.......(....r...p(....-...o.......(....r...p(....+..+....,...t....s0........}....*.0..I...............(.... N... !l..a%..^E................+.... ...Z ..a+....}....*....0..E........ q[0. ..L.a%..^E............#...+!....$...s#...}..... .(.+Z ]r..a+.*....0..

                              Static File Info

                              General

                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.405761902599822
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                              • Win32 Executable (generic) a (10002005/4) 49.97%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              • DOS Executable Generic (2002/1) 0.01%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:iGZtra5EaP.exe
                              File size:788480
                              MD5:5abfc84b2a671617a4930a61e218b6c6
                              SHA1:fb2e5175272b90aa204853dd2ba2dc175ff5958f
                              SHA256:776e6e841b2a1b1dacd2beb12f76949dc9a395a45bd7107475d90b60f09e5f39
                              SHA512:64a5e3c121442007176de090b4f24fbb7ffe0018bb774431d70b4941efe9264e23349cf0a83750beae6172e05d30c9cbaafd542f74fa22edfee190dd7515df36
                              SSDEEP:24576:K+J70cLvBwP+8oUSmntIV+60wST8OQpi:KK70qvFISLZ5I3
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....].`.................x..........^.... ........@.. .......................`............@................................

                              File Icon

                              Icon Hash:f8beee8f9792cc60

                              Static PE Info

                              General

                              Entrypoint:0x4a975e
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0x60FF5D0A [Tue Jul 27 01:10:34 2021 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:v4.0.30319
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                              Entrypoint Preview

                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al

                              Data Directories

                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xa970c0x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x18a1c.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xc40000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                              Sections

                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000xa77640xa7800False0.768110132929data7.50200224495IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rsrc0xaa0000x18a1c0x18c00False0.646977588384data6.18338598117IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0xc40000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                              Resources

                              NameRVASizeTypeLanguageCountry
                              RT_ICON0xaa1a80x468GLS_BINARY_LSB_FIRST
                              RT_ICON0xaa6100x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 14476016, next used block 16777215
                              RT_ICON0xab6b80x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                              RT_ICON0xadc600x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                              RT_ICON0xb1e880x10828dBase III DBT, version number 0, next free block index 40
                              RT_GROUP_ICON0xc26b00x4cdata
                              RT_VERSION0xc26fc0x320data

                              Imports

                              DLLImport
                              mscoree.dll_CorExeMain

                              Version Infos

                              DescriptionData
                              Translation0x0000 0x04b0
                              LegalCopyrightCopyright 2010 - 2021
                              Assembly Version1.0.0.0
                              InternalNameIpTl.exe
                              FileVersion1.0.0.0
                              CompanyNameDouglas Heriot
                              LegalTrademarks
                              Comments
                              ProductNameUno
                              ProductVersion1.0.0.0
                              FileDescriptionUno
                              OriginalFilenameIpTl.exe

                              Network Behavior

                              Snort IDS Alerts

                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                              08/03/21-21:13:53.952166TCP2025019ET TROJAN Possible NanoCore C2 60B497371177192.168.2.320.197.234.75
                              08/03/21-21:14:01.197544TCP2025019ET TROJAN Possible NanoCore C2 60B497431177192.168.2.320.197.234.75
                              08/03/21-21:14:08.027723TCP2025019ET TROJAN Possible NanoCore C2 60B497441177192.168.2.320.197.234.75
                              08/03/21-21:14:15.852637TCP2025019ET TROJAN Possible NanoCore C2 60B497451177192.168.2.320.197.234.75

                              Network Port Distribution

                              TCP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Aug 3, 2021 21:12:57.579962015 CEST497241177192.168.2.320.206.66.33
                              Aug 3, 2021 21:13:00.571827888 CEST497241177192.168.2.320.206.66.33
                              Aug 3, 2021 21:13:06.587903976 CEST497241177192.168.2.320.206.66.33
                              Aug 3, 2021 21:13:16.871193886 CEST497331177192.168.2.320.206.66.33
                              Aug 3, 2021 21:13:19.885943890 CEST497331177192.168.2.320.206.66.33
                              Aug 3, 2021 21:13:25.886432886 CEST497331177192.168.2.320.206.66.33
                              Aug 3, 2021 21:13:35.279393911 CEST497341177192.168.2.320.206.66.33
                              Aug 3, 2021 21:13:38.278109074 CEST497341177192.168.2.320.206.66.33
                              Aug 3, 2021 21:13:44.278810978 CEST497341177192.168.2.320.206.66.33
                              Aug 3, 2021 21:13:53.692378998 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:53.897825003 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:53.897969961 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:53.952166080 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:54.176150084 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:54.192786932 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:54.398108959 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:54.399007082 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:54.645457029 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:54.647166967 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:54.895523071 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:54.908375025 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:54.908399105 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:54.908425093 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:54.908472061 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:54.908510923 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:54.908514977 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:54.908531904 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:54.908560038 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:54.908570051 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:54.908590078 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:54.908622980 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:54.908626080 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:54.908644915 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:54.908664942 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:54.911101103 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:55.115344048 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.115370989 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.115396976 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.115415096 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.115437984 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.115452051 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.115462065 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:55.115470886 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.115494013 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.115519047 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.115537882 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.115552902 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.115564108 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:55.115570068 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.115595102 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.115596056 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:55.115617037 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:55.115617990 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.115633965 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.115648985 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.115668058 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:55.115905046 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:55.116800070 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.116831064 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.116842985 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.116854906 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.116878986 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:55.117013931 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:55.320789099 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.320813894 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.320841074 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.320861101 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.320880890 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.320899963 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.320930004 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.320945978 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:55.320950985 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.320966959 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:55.320971012 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.320997953 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.321034908 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:55.321091890 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.321137905 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.321180105 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:55.321201086 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.321219921 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.321244001 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:55.321263075 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.321283102 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.321306944 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.321320057 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:55.321325064 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.321346045 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.321368933 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.321386099 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.321386099 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:55.321404934 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.321428061 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.321450949 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:55.321451902 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.321466923 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:55.321469069 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.321472883 CEST497371177192.168.2.320.197.234.75
                              Aug 3, 2021 21:13:55.321489096 CEST11774973720.197.234.75192.168.2.3
                              Aug 3, 2021 21:13:55.321510077 CEST11774973720.197.234.75192.168.2.3

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Aug 3, 2021 21:12:01.109611988 CEST6493853192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:01.134887934 CEST53649388.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:02.063708067 CEST6015253192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:02.091734886 CEST53601528.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:03.066673994 CEST5754453192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:03.103312969 CEST53575448.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:04.533109903 CEST5598453192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:04.557722092 CEST53559848.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:06.049359083 CEST6418553192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:06.082962036 CEST53641858.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:07.082231998 CEST6511053192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:07.106795073 CEST53651108.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:08.409079075 CEST5836153192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:08.433707952 CEST53583618.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:09.438163042 CEST6349253192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:09.472070932 CEST53634928.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:10.619234085 CEST6083153192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:10.644360065 CEST53608318.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:11.951595068 CEST6010053192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:11.984942913 CEST53601008.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:13.041790962 CEST5319553192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:13.066571951 CEST53531958.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:14.066262007 CEST5014153192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:14.093660116 CEST53501418.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:15.132930994 CEST5302353192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:15.160356045 CEST53530238.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:16.128326893 CEST4956353192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:16.155726910 CEST53495638.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:16.948605061 CEST5135253192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:16.975970984 CEST53513528.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:17.785754919 CEST5934953192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:17.811728001 CEST53593498.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:18.827930927 CEST5708453192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:18.860707998 CEST53570848.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:28.849370003 CEST5882353192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:28.893198013 CEST53588238.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:38.021297932 CEST5756853192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:38.058449030 CEST53575688.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:55.061098099 CEST5054053192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:55.111238003 CEST53505408.8.8.8192.168.2.3
                              Aug 3, 2021 21:12:57.517040014 CEST5436653192.168.2.38.8.8.8
                              Aug 3, 2021 21:12:57.551525116 CEST53543668.8.8.8192.168.2.3
                              Aug 3, 2021 21:13:05.174351931 CEST5303453192.168.2.38.8.8.8
                              Aug 3, 2021 21:13:05.206892967 CEST53530348.8.8.8192.168.2.3
                              Aug 3, 2021 21:13:08.243547916 CEST5776253192.168.2.38.8.8.8
                              Aug 3, 2021 21:13:08.280884027 CEST53577628.8.8.8192.168.2.3
                              Aug 3, 2021 21:13:16.810172081 CEST5543553192.168.2.38.8.8.8
                              Aug 3, 2021 21:13:16.852745056 CEST53554358.8.8.8192.168.2.3
                              Aug 3, 2021 21:13:35.243072987 CEST5071353192.168.2.38.8.8.8
                              Aug 3, 2021 21:13:35.278100014 CEST53507138.8.8.8192.168.2.3
                              Aug 3, 2021 21:13:41.339929104 CEST5613253192.168.2.38.8.8.8
                              Aug 3, 2021 21:13:41.373847961 CEST53561328.8.8.8192.168.2.3
                              Aug 3, 2021 21:13:53.562072992 CEST5898753192.168.2.38.8.8.8
                              Aug 3, 2021 21:13:53.690700054 CEST53589878.8.8.8192.168.2.3
                              Aug 3, 2021 21:13:55.349746943 CEST5657953192.168.2.38.8.8.8
                              Aug 3, 2021 21:13:55.382289886 CEST53565798.8.8.8192.168.2.3
                              Aug 3, 2021 21:13:55.394263983 CEST6063353192.168.2.38.8.8.8
                              Aug 3, 2021 21:13:55.441853046 CEST53606338.8.8.8192.168.2.3
                              Aug 3, 2021 21:14:00.827917099 CEST6129253192.168.2.38.8.8.8
                              Aug 3, 2021 21:14:00.968957901 CEST53612928.8.8.8192.168.2.3
                              Aug 3, 2021 21:14:07.783363104 CEST6361953192.168.2.38.8.8.8
                              Aug 3, 2021 21:14:07.818789959 CEST53636198.8.8.8192.168.2.3
                              Aug 3, 2021 21:14:15.611778975 CEST6493853192.168.2.38.8.8.8
                              Aug 3, 2021 21:14:15.644599915 CEST53649388.8.8.8192.168.2.3
                              Aug 3, 2021 21:14:22.665736914 CEST6194653192.168.2.38.8.8.8
                              Aug 3, 2021 21:14:22.698612928 CEST53619468.8.8.8192.168.2.3
                              Aug 3, 2021 21:14:22.919195890 CEST6491053192.168.2.38.8.8.8
                              Aug 3, 2021 21:14:22.952229977 CEST53649108.8.8.8192.168.2.3

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Aug 3, 2021 21:12:57.517040014 CEST192.168.2.38.8.8.80x2fa0Standard query (0)microsoftsecurity.sytes.netA (IP address)IN (0x0001)
                              Aug 3, 2021 21:13:16.810172081 CEST192.168.2.38.8.8.80xced5Standard query (0)microsoftsecurity.sytes.netA (IP address)IN (0x0001)
                              Aug 3, 2021 21:13:35.243072987 CEST192.168.2.38.8.8.80x56c6Standard query (0)microsoftsecurity.sytes.netA (IP address)IN (0x0001)
                              Aug 3, 2021 21:13:53.562072992 CEST192.168.2.38.8.8.80x3bf6Standard query (0)backupnew.duckdns.orgA (IP address)IN (0x0001)
                              Aug 3, 2021 21:14:00.827917099 CEST192.168.2.38.8.8.80x5378Standard query (0)backupnew.duckdns.orgA (IP address)IN (0x0001)
                              Aug 3, 2021 21:14:07.783363104 CEST192.168.2.38.8.8.80xa0b0Standard query (0)backupnew.duckdns.orgA (IP address)IN (0x0001)
                              Aug 3, 2021 21:14:15.611778975 CEST192.168.2.38.8.8.80xdf8fStandard query (0)backupnew.duckdns.orgA (IP address)IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Aug 3, 2021 21:12:57.551525116 CEST8.8.8.8192.168.2.30x2fa0No error (0)microsoftsecurity.sytes.net20.206.66.33A (IP address)IN (0x0001)
                              Aug 3, 2021 21:13:16.852745056 CEST8.8.8.8192.168.2.30xced5No error (0)microsoftsecurity.sytes.net20.206.66.33A (IP address)IN (0x0001)
                              Aug 3, 2021 21:13:35.278100014 CEST8.8.8.8192.168.2.30x56c6No error (0)microsoftsecurity.sytes.net20.206.66.33A (IP address)IN (0x0001)
                              Aug 3, 2021 21:13:53.690700054 CEST8.8.8.8192.168.2.30x3bf6No error (0)backupnew.duckdns.org20.197.234.75A (IP address)IN (0x0001)
                              Aug 3, 2021 21:14:00.968957901 CEST8.8.8.8192.168.2.30x5378No error (0)backupnew.duckdns.org20.197.234.75A (IP address)IN (0x0001)
                              Aug 3, 2021 21:14:07.818789959 CEST8.8.8.8192.168.2.30xa0b0No error (0)backupnew.duckdns.org20.197.234.75A (IP address)IN (0x0001)
                              Aug 3, 2021 21:14:15.644599915 CEST8.8.8.8192.168.2.30xdf8fNo error (0)backupnew.duckdns.org20.197.234.75A (IP address)IN (0x0001)

                              Code Manipulations

                              Statistics

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:21:12:07
                              Start date:03/08/2021
                              Path:C:\Users\user\Desktop\iGZtra5EaP.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\Desktop\iGZtra5EaP.exe'
                              Imagebase:0x950000
                              File size:788480 bytes
                              MD5 hash:5ABFC84B2A671617A4930A61E218B6C6
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.294511650.0000000003CC9000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.294511650.0000000003CC9000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.294511650.0000000003CC9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.293558443.0000000002CC1000.00000004.00000001.sdmp, Author: Joe Security
                              Reputation:low

                              General

                              Start time:21:12:49
                              Start date:03/08/2021
                              Path:C:\Windows\SysWOW64\schtasks.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmp3997.tmp'
                              Imagebase:0xae0000
                              File size:185856 bytes
                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:21:12:50
                              Start date:03/08/2021
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6b2800000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:21:12:51
                              Start date:03/08/2021
                              Path:C:\Users\user\Desktop\iGZtra5EaP.exe
                              Wow64 process (32bit):true
                              Commandline:{path}
                              Imagebase:0xef0000
                              File size:788480 bytes
                              MD5 hash:5ABFC84B2A671617A4930A61E218B6C6
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.482078580.0000000006E40000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.482078580.0000000006E40000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.476961664.000000000454E000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.476961664.000000000454E000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.477178193.000000000465D000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.482179100.0000000006E90000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.482179100.0000000006E90000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.471078718.0000000001AD0000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.471078718.0000000001AD0000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.475401082.000000000374C000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.481910813.0000000006DB0000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.481910813.0000000006DB0000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.481995550.0000000006E00000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.481995550.0000000006E00000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.481497763.00000000069D0000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.481497763.00000000069D0000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.481497763.00000000069D0000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.482020693.0000000006E10000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.482020693.0000000006E10000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.481961618.0000000006DE0000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.481961618.0000000006DE0000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.481945946.0000000006DD0000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.481945946.0000000006DD0000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.467302367.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.467302367.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.467302367.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.482036750.0000000006E20000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.482036750.0000000006E20000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.473787584.00000000034F7000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.480093816.0000000005EC0000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.480093816.0000000005EC0000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.482102080.0000000006E50000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.482102080.0000000006E50000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.477941629.00000000048DF000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.477941629.00000000048DF000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.480306697.0000000006760000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.480306697.0000000006760000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.476599395.00000000044C9000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.476599395.00000000044C9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.476392070.0000000004481000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.476392070.0000000004481000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.481978911.0000000006DF0000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.481978911.0000000006DF0000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.472713339.0000000003481000.00000004.00000001.sdmp, Author: Joe Security
                              Reputation:low

                              General

                              Start time:21:12:53
                              Start date:03/08/2021
                              Path:C:\Windows\SysWOW64\schtasks.exe
                              Wow64 process (32bit):true
                              Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp489A.tmp'
                              Imagebase:0xae0000
                              File size:185856 bytes
                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:21:12:53
                              Start date:03/08/2021
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6b2800000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:21:12:54
                              Start date:03/08/2021
                              Path:C:\Windows\SysWOW64\schtasks.exe
                              Wow64 process (32bit):true
                              Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp4CC2.tmp'
                              Imagebase:0xae0000
                              File size:185856 bytes
                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:21:12:54
                              Start date:03/08/2021
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6b2800000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:21:12:56
                              Start date:03/08/2021
                              Path:C:\Users\user\Desktop\iGZtra5EaP.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\iGZtra5EaP.exe 0
                              Imagebase:0x630000
                              File size:788480 bytes
                              MD5 hash:5ABFC84B2A671617A4930A61E218B6C6
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000011.00000002.398277931.0000000002B51000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000011.00000002.400817271.0000000003B59000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000011.00000002.400817271.0000000003B59000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000011.00000002.400817271.0000000003B59000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              Reputation:low

                              General

                              Start time:21:12:57
                              Start date:03/08/2021
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                              Imagebase:0xc60000
                              File size:788480 bytes
                              MD5 hash:5ABFC84B2A671617A4930A61E218B6C6
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.404628541.0000000004099000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.404628541.0000000004099000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.404628541.0000000004099000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000012.00000002.400511596.0000000003091000.00000004.00000001.sdmp, Author: Joe Security
                              Antivirus matches:
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 64%, ReversingLabs
                              Reputation:low

                              General

                              Start time:21:13:03
                              Start date:03/08/2021
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                              Imagebase:0xc20000
                              File size:788480 bytes
                              MD5 hash:5ABFC84B2A671617A4930A61E218B6C6
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000014.00000002.411142657.0000000003141000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.412689646.0000000004149000.00000004.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.412689646.0000000004149000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.412689646.0000000004149000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              Reputation:low

                              General

                              Start time:21:13:37
                              Start date:03/08/2021
                              Path:C:\Windows\SysWOW64\schtasks.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmpF219.tmp'
                              Imagebase:0xae0000
                              File size:185856 bytes
                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:21:13:38
                              Start date:03/08/2021
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6b2800000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:21:13:38
                              Start date:03/08/2021
                              Path:C:\Users\user\Desktop\iGZtra5EaP.exe
                              Wow64 process (32bit):true
                              Commandline:{path}
                              Imagebase:0x520000
                              File size:788480 bytes
                              MD5 hash:5ABFC84B2A671617A4930A61E218B6C6
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000002.417862891.0000000002A11000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000001B.00000002.417862891.0000000002A11000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001B.00000002.415827598.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000002.415827598.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000001B.00000002.415827598.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000002.418018556.0000000003A19000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000001B.00000002.418018556.0000000003A19000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              Reputation:low

                              General

                              Start time:21:13:38
                              Start date:03/08/2021
                              Path:C:\Windows\SysWOW64\schtasks.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmpF5E2.tmp'
                              Imagebase:0xae0000
                              File size:185856 bytes
                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              General

                              Start time:21:13:39
                              Start date:03/08/2021
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6b2800000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              General

                              Start time:21:13:40
                              Start date:03/08/2021
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):true
                              Commandline:{path}
                              Imagebase:0xb20000
                              File size:788480 bytes
                              MD5 hash:5ABFC84B2A671617A4930A61E218B6C6
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001E.00000002.422052368.0000000003011000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000001E.00000002.422052368.0000000003011000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001E.00000002.417477798.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001E.00000002.417477798.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000001E.00000002.417477798.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001E.00000002.423536148.0000000004019000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 0000001E.00000002.423536148.0000000004019000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                              General

                              Start time:21:13:43
                              Start date:03/08/2021
                              Path:C:\Windows\SysWOW64\schtasks.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eBopYzBwUYOW' /XML 'C:\Users\user\AppData\Local\Temp\tmp63D.tmp'
                              Imagebase:0xae0000
                              File size:185856 bytes
                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              General

                              Start time:21:13:43
                              Start date:03/08/2021
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6b2800000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              General

                              Start time:21:13:44
                              Start date:03/08/2021
                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              Wow64 process (32bit):true
                              Commandline:{path}
                              Imagebase:0xb10000
                              File size:788480 bytes
                              MD5 hash:5ABFC84B2A671617A4930A61E218B6C6
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000021.00000002.428437498.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000021.00000002.428437498.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000021.00000002.428437498.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000021.00000002.431850871.0000000003FA9000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000021.00000002.431850871.0000000003FA9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000021.00000002.431679291.0000000002FA1000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: NanoCore, Description: unknown, Source: 00000021.00000002.431679291.0000000002FA1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                              Disassembly

                              Code Analysis

                              Reset < >