Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
INQUIRY.exe

Overview

General Information

Sample Name:INQUIRY.exe
Analysis ID:558450
MD5:dc0acc75361bb39fbd4abec6edc82cd5
SHA1:9e9c823725bee12d0980009c04692ad9089d9308
SHA256:d73cbcb2d300d84618d476706765b185c12d20d2e52afe120fb587c81be7cc80
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Yara detected Nanocore RAT
Detected unpacking (creates a PE file in dynamic memory)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses dynamic DNS services
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • INQUIRY.exe (PID: 6904 cmdline: "C:\Users\user\Desktop\INQUIRY.exe" MD5: DC0ACC75361BB39FBD4ABEC6EDC82CD5)
    • INQUIRY.exe (PID: 7084 cmdline: "C:\Users\user\Desktop\INQUIRY.exe" MD5: DC0ACC75361BB39FBD4ABEC6EDC82CD5)
  • rstmgknbahw.exe (PID: 6472 cmdline: "C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe" MD5: DC0ACC75361BB39FBD4ABEC6EDC82CD5)
    • rstmgknbahw.exe (PID: 1904 cmdline: "C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe" MD5: DC0ACC75361BB39FBD4ABEC6EDC82CD5)
  • rstmgknbahw.exe (PID: 4296 cmdline: "C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe" MD5: DC0ACC75361BB39FBD4ABEC6EDC82CD5)
    • rstmgknbahw.exe (PID: 5320 cmdline: "C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe" MD5: DC0ACC75361BB39FBD4ABEC6EDC82CD5)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "b46b5964-4830-4c6b-9df5-a21557a1", "Group": "Default", "Domain1": "onyeoma.ddns.net", "Domain2": "127.0.0.1", "Port": 4141, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.719731750.0000000002400000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x215e5:$x1: NanoCore.ClientPluginHost
  • 0x21622:$x2: IClientNetworkHost
  • 0x25155:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000005.00000002.719731750.0000000002400000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x2135d:$x1: NanoCore Client.exe
  • 0x215e5:$x2: NanoCore.ClientPluginHost
  • 0x22c1e:$s1: PluginCommand
  • 0x22c12:$s2: FileCommand
  • 0x23ac3:$s3: PipeExists
  • 0x2987a:$s4: PipeCreated
  • 0x2160f:$s5: IClientLoggingHost
00000005.00000002.719731750.0000000002400000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000005.00000002.719731750.0000000002400000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x2134d:$a: NanoCore
    • 0x2135d:$a: NanoCore
    • 0x21591:$a: NanoCore
    • 0x215a5:$a: NanoCore
    • 0x215e5:$a: NanoCore
    • 0x213ac:$b: ClientPlugin
    • 0x215ae:$b: ClientPlugin
    • 0x215ee:$b: ClientPlugin
    • 0x214d3:$c: ProjectData
    • 0x21eda:$d: DESCrypto
    • 0x298a6:$e: KeepAlive
    • 0x27894:$g: LogClientMessage
    • 0x23a8f:$i: get_Connected
    • 0x22210:$j: #=q
    • 0x22240:$j: #=q
    • 0x2225c:$j: #=q
    • 0x2228c:$j: #=q
    • 0x222a8:$j: #=q
    • 0x222c4:$j: #=q
    • 0x222f4:$j: #=q
    • 0x22310:$j: #=q
    00000002.00000000.662575253.0000000000414000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x111e5:$x1: NanoCore.ClientPluginHost
    • 0x11222:$x2: IClientNetworkHost
    • 0x14d55:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    Click to see the 99 entries
    SourceRuleDescriptionAuthorStrings
    6.0.rstmgknbahw.exe.400000.1.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x85e5:$x1: NanoCore.ClientPluginHost
    • 0x8622:$x2: IClientNetworkHost
    • 0xc155:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    6.0.rstmgknbahw.exe.400000.1.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x835d:$x1: NanoCore Client.exe
    • 0x85e5:$x2: NanoCore.ClientPluginHost
    • 0x9c1e:$s1: PluginCommand
    • 0x9c12:$s2: FileCommand
    • 0xaac3:$s3: PipeExists
    • 0x1087a:$s4: PipeCreated
    • 0x860f:$s5: IClientLoggingHost
    6.0.rstmgknbahw.exe.400000.1.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      6.0.rstmgknbahw.exe.400000.1.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x834d:$a: NanoCore
      • 0x835d:$a: NanoCore
      • 0x8591:$a: NanoCore
      • 0x85a5:$a: NanoCore
      • 0x85e5:$a: NanoCore
      • 0x83ac:$b: ClientPlugin
      • 0x85ae:$b: ClientPlugin
      • 0x85ee:$b: ClientPlugin
      • 0x84d3:$c: ProjectData
      • 0x8eda:$d: DESCrypto
      • 0x108a6:$e: KeepAlive
      • 0xe894:$g: LogClientMessage
      • 0xaa8f:$i: get_Connected
      • 0x9210:$j: #=q
      • 0x9240:$j: #=q
      • 0x925c:$j: #=q
      • 0x928c:$j: #=q
      • 0x92a8:$j: #=q
      • 0x92c4:$j: #=q
      • 0x92f4:$j: #=q
      • 0x9310:$j: #=q
      6.2.rstmgknbahw.exe.37a3258.4.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      Click to see the 416 entries

      AV Detection

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\INQUIRY.exe, ProcessId: 7084, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\INQUIRY.exe, ProcessId: 7084, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Stealing of Sensitive Information

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\INQUIRY.exe, ProcessId: 7084, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\INQUIRY.exe, ProcessId: 7084, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 00000004.00000002.725196610.000000000390A000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "b46b5964-4830-4c6b-9df5-a21557a1", "Group": "Default", "Domain1": "onyeoma.ddns.net", "Domain2": "127.0.0.1", "Port": 4141, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.37a3258.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.415058.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.rstmgknbahw.exe.2411458.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.3820e14.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.6d8d50.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.1.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.rstmgknbahw.exe.2300000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.415058.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.415058.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.382543d.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.rstmgknbahw.exe.2311458.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.2510000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.3950e14.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.1.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.4980000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.3950e14.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.415058.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.49d0000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.4940000.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.1.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.415058.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.638d50.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.394bfde.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.415058.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.rstmgknbahw.exe.2311458.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.24e0000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.415058.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.INQUIRY.exe.22e0000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.INQUIRY.exe.22f1458.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.415058.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.415058.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.39a98c0.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.2510000.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.395543d.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.1.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.415058.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.39adee9.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.6d8d50.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.1.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.rstmgknbahw.exe.2411458.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.381bfde.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.24e0000.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.1.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.1.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.782558.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.415058.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.INQUIRY.exe.22f1458.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.rstmgknbahw.exe.2400000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.38d3258.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.39a98c0.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.782558.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.38d3258.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.3820e14.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.2520000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.INQUIRY.exe.22e0000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.4940000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.37a3258.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.rstmgknbahw.exe.2300000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.415058.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.rstmgknbahw.exe.2400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.638d50.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000005.00000002.719731750.0000000002400000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000000.662575253.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.918404744.0000000002522000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.735100285.0000000004940000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.665449354.00000000022E0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.917467270.0000000000774000.00000004.00000020.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000001.703365040.0000000000400000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.723024476.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000000.716081773.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000001.718977051.0000000000414000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.725072072.0000000002510000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.725158787.00000000038D1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.725196610.000000000390A000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.735022366.00000000037DA000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.734234340.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.704939952.0000000002300000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.916471993.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.735138898.0000000004982000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.734386129.0000000000625000.00000004.00000020.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.734985665.00000000037A1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000000.701936247.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000000.663644960.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.724570206.00000000006C5000.00000004.00000020.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000000.718272419.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000000.702725030.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.725281266.00000000049D2000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.918375056.00000000024E0000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.918797240.00000000039A2000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: INQUIRY.exe PID: 6904, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: INQUIRY.exe PID: 7084, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: rstmgknbahw.exe PID: 1904, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: rstmgknbahw.exe PID: 5320, type: MEMORYSTR
      Source: INQUIRY.exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeJoe Sandbox ML: detected
      Source: 4.0.rstmgknbahw.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 1.2.INQUIRY.exe.30e0000.5.unpackAvira: Label: TR/Patched.Ren.Gen
      Source: 2.0.INQUIRY.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 2.0.INQUIRY.exe.400000.7.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 6.0.rstmgknbahw.exe.400000.7.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 2.0.INQUIRY.exe.400000.5.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 6.2.rstmgknbahw.exe.4980000.9.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 6.0.rstmgknbahw.exe.400000.9.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 4.2.rstmgknbahw.exe.49d0000.9.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 4.0.rstmgknbahw.exe.400000.9.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 2.0.INQUIRY.exe.400000.9.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 2.0.INQUIRY.exe.400000.11.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 6.0.rstmgknbahw.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 6.2.rstmgknbahw.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 6.1.rstmgknbahw.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 6.0.rstmgknbahw.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 4.0.rstmgknbahw.exe.400000.11.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 4.0.rstmgknbahw.exe.400000.7.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 4.0.rstmgknbahw.exe.400000.5.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 4.1.rstmgknbahw.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 2.2.INQUIRY.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 2.2.INQUIRY.exe.39a98c0.6.unpackAvira: Label: TR/NanoCore.fadte
      Source: 6.0.rstmgknbahw.exe.400000.5.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 4.2.rstmgknbahw.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 6.0.rstmgknbahw.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 2.2.INQUIRY.exe.2520000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 4.0.rstmgknbahw.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 2.0.INQUIRY.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 2.0.INQUIRY.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 6.0.rstmgknbahw.exe.400000.11.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 4.0.rstmgknbahw.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7

      Compliance

      barindex
      Source: C:\Users\user\Desktop\INQUIRY.exeUnpacked PE file: 2.2.INQUIRY.exe.2520000.4.unpack
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeUnpacked PE file: 6.2.rstmgknbahw.exe.4980000.9.unpack
      Source: INQUIRY.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: C:\Users\user\Desktop\INQUIRY.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: Binary string: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.pdb source: INQUIRY.exe, 00000002.00000002.918475302.00000000025C7000.00000004.00000040.sdmp
      Source: Binary string: C:\Windows\mscorlib.pdb] source: INQUIRY.exe, 00000002.00000002.918475302.00000000025C7000.00000004.00000040.sdmp
      Source: Binary string: mscorlib.pdb source: INQUIRY.exe, 00000002.00000002.918475302.00000000025C7000.00000004.00000040.sdmp
      Source: Binary string: mscorlib.pdbX source: INQUIRY.exe, 00000002.00000002.918475302.00000000025C7000.00000004.00000040.sdmp
      Source: Binary string: wntdll.pdbUGP source: INQUIRY.exe, 00000001.00000003.662943536.00000000033B0000.00000004.00000001.sdmp, INQUIRY.exe, 00000001.00000003.659087283.0000000003220000.00000004.00000001.sdmp, rstmgknbahw.exe, 00000003.00000003.702841984.00000000030F0000.00000004.00000001.sdmp, rstmgknbahw.exe, 00000003.00000003.698655774.0000000003280000.00000004.00000001.sdmp, rstmgknbahw.exe, 00000005.00000003.709826822.00000000030E0000.00000004.00000001.sdmp, rstmgknbahw.exe, 00000005.00000003.711484064.0000000003270000.00000004.00000001.sdmp
      Source: Binary string: wntdll.pdb source: INQUIRY.exe, 00000001.00000003.662943536.00000000033B0000.00000004.00000001.sdmp, INQUIRY.exe, 00000001.00000003.659087283.0000000003220000.00000004.00000001.sdmp, rstmgknbahw.exe, 00000003.00000003.702841984.00000000030F0000.00000004.00000001.sdmp, rstmgknbahw.exe, 00000003.00000003.698655774.0000000003280000.00000004.00000001.sdmp, rstmgknbahw.exe, 00000005.00000003.709826822.00000000030E0000.00000004.00000001.sdmp, rstmgknbahw.exe, 00000005.00000003.711484064.0000000003270000.00000004.00000001.sdmp
      Source: Binary string: indows\mscorlib.pdbpdblib.pdb source: INQUIRY.exe, 00000002.00000002.918475302.00000000025C7000.00000004.00000040.sdmp
      Source: Binary string: \??\C:\Windows\mscorlib.pdb source: INQUIRY.exe, 00000002.00000002.918001760.0000000000807000.00000004.00000020.sdmp
      Source: Binary string: C:\Windows\dll\mscorlib.pdb source: INQUIRY.exe, 00000002.00000002.918475302.00000000025C7000.00000004.00000040.sdmp
      Source: Binary string: rlib.pdb source: INQUIRY.exe, 00000002.00000002.918475302.00000000025C7000.00000004.00000040.sdmp
      Source: Binary string: C:\Windows\symbols\dll\mscorlib.pdb source: INQUIRY.exe, 00000002.00000002.918475302.00000000025C7000.00000004.00000040.sdmp
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_00405D7C FindFirstFileA,FindClose,
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_00402630 FindFirstFileA,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_2_00404A29 FindFirstFileExW,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_1_00404A29 FindFirstFileExW,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 5_2_00405D7C FindFirstFileA,FindClose,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 5_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 5_2_00402630 FindFirstFileA,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_2_00404A29 FindFirstFileExW,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_1_00404A29 FindFirstFileExW,

      Networking

      barindex
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49735 -> 185.140.53.6:4141
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49742 -> 185.140.53.6:4141
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49743 -> 185.140.53.6:4141
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49750 -> 185.140.53.6:4141
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49757 -> 185.140.53.6:4141
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49760 -> 185.140.53.6:4141
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49767 -> 185.140.53.6:4141
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49774 -> 185.140.53.6:4141
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49777 -> 185.140.53.6:4141
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49778 -> 185.140.53.6:4141
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49779 -> 185.140.53.6:4141
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49782 -> 185.140.53.6:4141
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49788 -> 185.140.53.6:4141
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49789 -> 185.140.53.6:4141
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49791 -> 185.140.53.6:4141
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49792 -> 185.140.53.6:4141
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49810 -> 185.140.53.6:4141
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49827 -> 185.140.53.6:4141
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49831 -> 185.140.53.6:4141
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49833 -> 185.140.53.6:4141
      Source: Malware configuration extractorURLs: onyeoma.ddns.net
      Source: Malware configuration extractorURLs: 127.0.0.1
      Source: unknownDNS query: name: onyeoma.ddns.net
      Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
      Source: Joe Sandbox ViewIP Address: 185.140.53.6 185.140.53.6
      Source: global trafficTCP traffic: 192.168.2.4:49735 -> 185.140.53.6:4141
      Source: rstmgknbahw.exe, rstmgknbahw.exe, 00000005.00000002.719289522.0000000000409000.00000004.00020000.sdmp, rstmgknbahw.exe, 00000005.00000000.695461777.0000000000409000.00000008.00020000.sdmp, rstmgknbahw.exe, 00000006.00000000.707759536.0000000000409000.00000008.00020000.sdmp, INQUIRY.exe, rstmgknbahw.exe.1.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
      Source: INQUIRY.exe, rstmgknbahw.exe.1.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: unknownDNS traffic detected: queries for: onyeoma.ddns.net
      Source: INQUIRY.exe, 00000002.00000002.918797240.00000000039A2000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_00404F61 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.37a3258.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.415058.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.rstmgknbahw.exe.2411458.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.3820e14.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.6d8d50.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.1.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.rstmgknbahw.exe.2300000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.415058.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.415058.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.382543d.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.rstmgknbahw.exe.2311458.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.2510000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.3950e14.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.1.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.4980000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.3950e14.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.415058.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.49d0000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.4940000.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.1.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.415058.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.638d50.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.394bfde.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.415058.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.rstmgknbahw.exe.2311458.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.24e0000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.415058.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.INQUIRY.exe.22e0000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.INQUIRY.exe.22f1458.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.415058.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.415058.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.39a98c0.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.2510000.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.395543d.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.1.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.415058.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.39adee9.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.6d8d50.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.1.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.rstmgknbahw.exe.2411458.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.381bfde.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.24e0000.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.1.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.1.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.782558.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.415058.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.INQUIRY.exe.22f1458.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.rstmgknbahw.exe.2400000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.38d3258.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.39a98c0.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.782558.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.38d3258.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.3820e14.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.2520000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.INQUIRY.exe.22e0000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.4940000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.37a3258.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.rstmgknbahw.exe.2300000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.415058.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.rstmgknbahw.exe.2400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.638d50.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000005.00000002.719731750.0000000002400000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000000.662575253.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.918404744.0000000002522000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.735100285.0000000004940000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.665449354.00000000022E0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.917467270.0000000000774000.00000004.00000020.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000001.703365040.0000000000400000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.723024476.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000000.716081773.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000001.718977051.0000000000414000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.725072072.0000000002510000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.725158787.00000000038D1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.725196610.000000000390A000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.735022366.00000000037DA000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.734234340.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.704939952.0000000002300000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.916471993.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.735138898.0000000004982000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.734386129.0000000000625000.00000004.00000020.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.734985665.00000000037A1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000000.701936247.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000000.663644960.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.724570206.00000000006C5000.00000004.00000020.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000000.718272419.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000000.702725030.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.725281266.00000000049D2000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.918375056.00000000024E0000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.918797240.00000000039A2000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: INQUIRY.exe PID: 6904, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: INQUIRY.exe PID: 7084, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: rstmgknbahw.exe PID: 1904, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: rstmgknbahw.exe PID: 5320, type: MEMORYSTR

      System Summary

      barindex
      Source: 6.0.rstmgknbahw.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.0.rstmgknbahw.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.2.rstmgknbahw.exe.37a3258.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.2.rstmgknbahw.exe.37a3258.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.0.rstmgknbahw.exe.415058.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.0.rstmgknbahw.exe.415058.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 5.2.rstmgknbahw.exe.2411458.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 5.2.rstmgknbahw.exe.2411458.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.0.rstmgknbahw.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.2.rstmgknbahw.exe.3820e14.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.1.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.0.rstmgknbahw.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.0.rstmgknbahw.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.0.rstmgknbahw.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.0.rstmgknbahw.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.rstmgknbahw.exe.6d8d50.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.0.rstmgknbahw.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.0.rstmgknbahw.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.rstmgknbahw.exe.6d8d50.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.0.rstmgknbahw.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.1.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.0.INQUIRY.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.0.INQUIRY.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 3.2.rstmgknbahw.exe.2300000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 3.2.rstmgknbahw.exe.2300000.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.0.INQUIRY.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.0.INQUIRY.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.2.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.2.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.0.rstmgknbahw.exe.415058.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.0.rstmgknbahw.exe.415058.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.0.rstmgknbahw.exe.415058.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.0.rstmgknbahw.exe.415058.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.2.rstmgknbahw.exe.382543d.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.0.INQUIRY.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.0.INQUIRY.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.0.INQUIRY.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.0.INQUIRY.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.0.rstmgknbahw.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.0.rstmgknbahw.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 3.2.rstmgknbahw.exe.2311458.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 3.2.rstmgknbahw.exe.2311458.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.rstmgknbahw.exe.2510000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.rstmgknbahw.exe.2510000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.rstmgknbahw.exe.3950e14.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.1.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.1.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.2.rstmgknbahw.exe.4980000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.2.rstmgknbahw.exe.4980000.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.rstmgknbahw.exe.3950e14.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.0.rstmgknbahw.exe.415058.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.0.rstmgknbahw.exe.415058.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.rstmgknbahw.exe.49d0000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.rstmgknbahw.exe.49d0000.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.0.INQUIRY.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.0.INQUIRY.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.0.rstmgknbahw.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.0.rstmgknbahw.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.2.rstmgknbahw.exe.4940000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.2.rstmgknbahw.exe.4940000.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.0.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.0.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.1.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.1.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.0.rstmgknbahw.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.0.rstmgknbahw.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.0.INQUIRY.exe.415058.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.0.INQUIRY.exe.415058.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.0.INQUIRY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.0.INQUIRY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.2.rstmgknbahw.exe.638d50.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.2.rstmgknbahw.exe.638d50.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.rstmgknbahw.exe.394bfde.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.rstmgknbahw.exe.394bfde.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.0.rstmgknbahw.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.0.rstmgknbahw.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.0.INQUIRY.exe.415058.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.0.INQUIRY.exe.415058.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.0.INQUIRY.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.0.INQUIRY.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 3.2.rstmgknbahw.exe.2311458.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 3.2.rstmgknbahw.exe.2311458.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.2.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.2.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.0.INQUIRY.exe.400000.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.0.INQUIRY.exe.400000.11.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.0.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.0.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.2.INQUIRY.exe.24e0000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.2.INQUIRY.exe.24e0000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.0.INQUIRY.exe.415058.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.0.INQUIRY.exe.415058.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 1.2.INQUIRY.exe.22e0000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 1.2.INQUIRY.exe.22e0000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.2.INQUIRY.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.2.INQUIRY.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 1.2.INQUIRY.exe.22f1458.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 1.2.INQUIRY.exe.22f1458.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.2.INQUIRY.exe.2921548.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.2.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.2.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.2.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.2.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.0.rstmgknbahw.exe.415058.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.0.rstmgknbahw.exe.415058.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.0.rstmgknbahw.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.0.rstmgknbahw.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.0.rstmgknbahw.exe.415058.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.0.rstmgknbahw.exe.415058.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.2.INQUIRY.exe.39a98c0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.rstmgknbahw.exe.2510000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.rstmgknbahw.exe.2510000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.rstmgknbahw.exe.395543d.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.1.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.1.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.0.INQUIRY.exe.415058.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.0.INQUIRY.exe.415058.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.2.INQUIRY.exe.39adee9.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.rstmgknbahw.exe.6d8d50.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.rstmgknbahw.exe.6d8d50.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.rstmgknbahw.exe.28f68dc.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.1.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.1.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 5.2.rstmgknbahw.exe.2411458.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 5.2.rstmgknbahw.exe.2411458.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.2.rstmgknbahw.exe.381bfde.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.2.rstmgknbahw.exe.381bfde.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.2.INQUIRY.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.2.INQUIRY.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.0.rstmgknbahw.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.0.rstmgknbahw.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.2.INQUIRY.exe.24e0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.2.INQUIRY.exe.24e0000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.1.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.1.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.0.rstmgknbahw.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.0.rstmgknbahw.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.0.rstmgknbahw.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.0.rstmgknbahw.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.0.rstmgknbahw.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.0.rstmgknbahw.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.1.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.1.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.0.rstmgknbahw.exe.400000.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.0.rstmgknbahw.exe.400000.11.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.2.INQUIRY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.2.INQUIRY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.2.INQUIRY.exe.782558.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.2.INQUIRY.exe.782558.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.0.rstmgknbahw.exe.415058.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.0.rstmgknbahw.exe.415058.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 1.2.INQUIRY.exe.22f1458.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 1.2.INQUIRY.exe.22f1458.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 5.2.rstmgknbahw.exe.2400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 5.2.rstmgknbahw.exe.2400000.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.2.rstmgknbahw.exe.27c68dc.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.rstmgknbahw.exe.38d3258.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.rstmgknbahw.exe.38d3258.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.2.INQUIRY.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.2.INQUIRY.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.2.INQUIRY.exe.39a98c0.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.0.INQUIRY.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.0.INQUIRY.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.2.INQUIRY.exe.782558.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.2.INQUIRY.exe.782558.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.0.rstmgknbahw.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.0.rstmgknbahw.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.rstmgknbahw.exe.38d3258.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.rstmgknbahw.exe.38d3258.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.2.rstmgknbahw.exe.3820e14.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.2.INQUIRY.exe.2520000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.2.INQUIRY.exe.2520000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.0.rstmgknbahw.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.0.rstmgknbahw.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 1.2.INQUIRY.exe.22e0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 1.2.INQUIRY.exe.22e0000.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.2.rstmgknbahw.exe.4940000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.2.rstmgknbahw.exe.4940000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.2.rstmgknbahw.exe.37a3258.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.2.rstmgknbahw.exe.37a3258.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.0.rstmgknbahw.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.0.INQUIRY.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.0.INQUIRY.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.0.rstmgknbahw.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 3.2.rstmgknbahw.exe.2300000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 3.2.rstmgknbahw.exe.2300000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 2.0.INQUIRY.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 2.0.INQUIRY.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.0.rstmgknbahw.exe.415058.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.0.rstmgknbahw.exe.415058.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 5.2.rstmgknbahw.exe.2400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 5.2.rstmgknbahw.exe.2400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.0.rstmgknbahw.exe.400000.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.0.rstmgknbahw.exe.400000.11.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 6.2.rstmgknbahw.exe.638d50.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 6.2.rstmgknbahw.exe.638d50.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.0.rstmgknbahw.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.0.rstmgknbahw.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000005.00000002.719731750.0000000002400000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000005.00000002.719731750.0000000002400000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000002.00000000.662575253.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000002.00000000.662575253.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000002.00000002.918404744.0000000002522000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000002.00000002.918404744.0000000002522000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000006.00000002.735100285.0000000004940000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000006.00000002.735100285.0000000004940000.00000004.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000001.00000002.665449354.00000000022E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000001.00000002.665449354.00000000022E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000002.00000002.917467270.0000000000774000.00000004.00000020.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000002.00000002.917467270.0000000000774000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000004.00000001.703365040.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000004.00000001.703365040.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000004.00000002.723024476.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000004.00000002.723024476.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000006.00000000.716081773.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000006.00000000.716081773.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000006.00000001.718977051.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000006.00000001.718977051.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000006.00000002.734941801.00000000027AE000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000004.00000002.725072072.0000000002510000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000004.00000002.725072072.0000000002510000.00000004.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000004.00000002.725158787.00000000038D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000004.00000002.725158787.00000000038D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000004.00000002.725196610.000000000390A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000006.00000002.735022366.00000000037DA000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000006.00000002.734234340.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000006.00000002.734234340.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000003.00000002.704939952.0000000002300000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000003.00000002.704939952.0000000002300000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000004.00000002.725133013.00000000028DE000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000002.00000002.916471993.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000002.00000002.916471993.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000006.00000002.735138898.0000000004982000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000006.00000002.735138898.0000000004982000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000006.00000002.734386129.0000000000625000.00000004.00000020.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000006.00000002.734386129.0000000000625000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000006.00000002.734985665.00000000037A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000006.00000002.734985665.00000000037A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000004.00000000.701936247.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000004.00000000.701936247.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000002.00000000.663644960.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000002.00000000.663644960.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000004.00000002.724570206.00000000006C5000.00000004.00000020.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000004.00000002.724570206.00000000006C5000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000006.00000000.718272419.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000006.00000000.718272419.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000004.00000000.702725030.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000004.00000000.702725030.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000004.00000002.725281266.00000000049D2000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000004.00000002.725281266.00000000049D2000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000002.00000002.918375056.00000000024E0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000002.00000002.918375056.00000000024E0000.00000004.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: INQUIRY.exe PID: 6904, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: INQUIRY.exe PID: 6904, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: INQUIRY.exe PID: 7084, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: INQUIRY.exe PID: 7084, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: rstmgknbahw.exe PID: 1904, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: rstmgknbahw.exe PID: 1904, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: rstmgknbahw.exe PID: 5320, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: rstmgknbahw.exe PID: 5320, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: INQUIRY.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: 6.0.rstmgknbahw.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.0.rstmgknbahw.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.0.rstmgknbahw.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.2.rstmgknbahw.exe.37a3258.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.2.rstmgknbahw.exe.37a3258.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.2.rstmgknbahw.exe.37a3258.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.0.rstmgknbahw.exe.415058.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.0.rstmgknbahw.exe.415058.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.0.rstmgknbahw.exe.415058.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 5.2.rstmgknbahw.exe.2411458.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 5.2.rstmgknbahw.exe.2411458.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 5.2.rstmgknbahw.exe.2411458.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.0.rstmgknbahw.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.0.rstmgknbahw.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.2.rstmgknbahw.exe.3820e14.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.2.rstmgknbahw.exe.3820e14.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.1.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.1.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.0.rstmgknbahw.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.0.rstmgknbahw.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.0.rstmgknbahw.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.0.rstmgknbahw.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.0.rstmgknbahw.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.0.rstmgknbahw.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.rstmgknbahw.exe.6d8d50.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.rstmgknbahw.exe.6d8d50.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.0.rstmgknbahw.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.0.rstmgknbahw.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.0.rstmgknbahw.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.2.rstmgknbahw.exe.6d8d50.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.0.rstmgknbahw.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.1.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.0.INQUIRY.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.0.INQUIRY.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.0.INQUIRY.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 3.2.rstmgknbahw.exe.2300000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 3.2.rstmgknbahw.exe.2300000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.rstmgknbahw.exe.2300000.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.0.INQUIRY.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.0.INQUIRY.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.0.INQUIRY.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.2.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.2.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.2.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.0.rstmgknbahw.exe.415058.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.0.rstmgknbahw.exe.415058.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.0.rstmgknbahw.exe.415058.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.2.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.0.rstmgknbahw.exe.415058.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.0.rstmgknbahw.exe.415058.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.0.rstmgknbahw.exe.415058.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.2.rstmgknbahw.exe.382543d.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.2.rstmgknbahw.exe.382543d.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.0.INQUIRY.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.0.INQUIRY.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.0.INQUIRY.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.0.INQUIRY.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.0.INQUIRY.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.0.INQUIRY.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.0.rstmgknbahw.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.0.rstmgknbahw.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.0.rstmgknbahw.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 3.2.rstmgknbahw.exe.2311458.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 3.2.rstmgknbahw.exe.2311458.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.rstmgknbahw.exe.2311458.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.rstmgknbahw.exe.2510000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.rstmgknbahw.exe.2510000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.2.rstmgknbahw.exe.2510000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.rstmgknbahw.exe.3950e14.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.rstmgknbahw.exe.3950e14.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.1.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.1.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.1.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.2.rstmgknbahw.exe.4980000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.2.rstmgknbahw.exe.4980000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.2.rstmgknbahw.exe.4980000.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.rstmgknbahw.exe.3950e14.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.rstmgknbahw.exe.3950e14.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.0.rstmgknbahw.exe.415058.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.0.rstmgknbahw.exe.415058.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.0.rstmgknbahw.exe.415058.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.rstmgknbahw.exe.49d0000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.rstmgknbahw.exe.49d0000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.2.rstmgknbahw.exe.49d0000.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.0.INQUIRY.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.0.INQUIRY.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.0.INQUIRY.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.0.rstmgknbahw.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.0.rstmgknbahw.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.0.rstmgknbahw.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.2.rstmgknbahw.exe.4940000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.2.rstmgknbahw.exe.4940000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.2.rstmgknbahw.exe.4940000.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.0.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.0.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.0.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.1.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.1.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.1.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.2.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.0.rstmgknbahw.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.0.rstmgknbahw.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.0.rstmgknbahw.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.0.INQUIRY.exe.415058.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.0.INQUIRY.exe.415058.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.0.INQUIRY.exe.415058.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.0.INQUIRY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.0.INQUIRY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.0.INQUIRY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.2.rstmgknbahw.exe.638d50.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.2.rstmgknbahw.exe.638d50.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.2.rstmgknbahw.exe.638d50.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.rstmgknbahw.exe.394bfde.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.rstmgknbahw.exe.394bfde.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.2.rstmgknbahw.exe.394bfde.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.0.rstmgknbahw.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.0.rstmgknbahw.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.0.rstmgknbahw.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.0.INQUIRY.exe.415058.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.0.INQUIRY.exe.415058.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.0.INQUIRY.exe.415058.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.0.INQUIRY.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.0.INQUIRY.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.0.INQUIRY.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 3.2.rstmgknbahw.exe.2311458.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 3.2.rstmgknbahw.exe.2311458.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.rstmgknbahw.exe.2311458.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.2.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.2.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.2.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.0.INQUIRY.exe.400000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.0.INQUIRY.exe.400000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.0.INQUIRY.exe.400000.11.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.0.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.0.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.0.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.2.INQUIRY.exe.24e0000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.INQUIRY.exe.24e0000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.2.INQUIRY.exe.24e0000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.0.INQUIRY.exe.415058.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.0.INQUIRY.exe.415058.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.0.INQUIRY.exe.415058.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 1.2.INQUIRY.exe.22e0000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 1.2.INQUIRY.exe.22e0000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.INQUIRY.exe.22e0000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.2.INQUIRY.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.INQUIRY.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.2.INQUIRY.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 1.2.INQUIRY.exe.22f1458.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 1.2.INQUIRY.exe.22f1458.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.INQUIRY.exe.22f1458.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.2.INQUIRY.exe.2921548.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.INQUIRY.exe.2921548.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.2.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.2.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.2.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.2.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.2.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.2.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.0.rstmgknbahw.exe.415058.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.0.rstmgknbahw.exe.415058.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.0.rstmgknbahw.exe.415058.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.0.rstmgknbahw.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.0.rstmgknbahw.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.0.rstmgknbahw.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.0.rstmgknbahw.exe.415058.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.0.rstmgknbahw.exe.415058.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.0.rstmgknbahw.exe.415058.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.2.INQUIRY.exe.39a98c0.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.INQUIRY.exe.39a98c0.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.2.rstmgknbahw.exe.2510000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.rstmgknbahw.exe.2510000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.2.rstmgknbahw.exe.2510000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.rstmgknbahw.exe.395543d.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.rstmgknbahw.exe.395543d.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.1.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.1.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.1.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.0.INQUIRY.exe.415058.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.0.INQUIRY.exe.415058.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.0.INQUIRY.exe.415058.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.2.INQUIRY.exe.39adee9.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.INQUIRY.exe.39adee9.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.2.rstmgknbahw.exe.6d8d50.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.rstmgknbahw.exe.6d8d50.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.2.rstmgknbahw.exe.6d8d50.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.rstmgknbahw.exe.28f68dc.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.rstmgknbahw.exe.28f68dc.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.1.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.1.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.1.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 5.2.rstmgknbahw.exe.2411458.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 5.2.rstmgknbahw.exe.2411458.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 5.2.rstmgknbahw.exe.2411458.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.2.rstmgknbahw.exe.381bfde.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.2.rstmgknbahw.exe.381bfde.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.2.rstmgknbahw.exe.381bfde.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.2.INQUIRY.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.INQUIRY.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.2.INQUIRY.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.2.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.0.rstmgknbahw.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.0.rstmgknbahw.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.0.rstmgknbahw.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.2.INQUIRY.exe.24e0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.INQUIRY.exe.24e0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.2.INQUIRY.exe.24e0000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.1.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.1.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.1.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.0.rstmgknbahw.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.0.rstmgknbahw.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.0.rstmgknbahw.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.0.rstmgknbahw.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.0.rstmgknbahw.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.0.rstmgknbahw.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.0.rstmgknbahw.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.0.rstmgknbahw.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.0.rstmgknbahw.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.1.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.1.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.1.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.0.rstmgknbahw.exe.400000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.0.rstmgknbahw.exe.400000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.0.rstmgknbahw.exe.400000.11.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.2.INQUIRY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.INQUIRY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.2.INQUIRY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.2.INQUIRY.exe.782558.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.INQUIRY.exe.782558.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.2.INQUIRY.exe.782558.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.0.rstmgknbahw.exe.415058.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.0.rstmgknbahw.exe.415058.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.0.rstmgknbahw.exe.415058.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 1.2.INQUIRY.exe.22f1458.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 1.2.INQUIRY.exe.22f1458.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.INQUIRY.exe.22f1458.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 5.2.rstmgknbahw.exe.2400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 5.2.rstmgknbahw.exe.2400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 5.2.rstmgknbahw.exe.2400000.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.2.rstmgknbahw.exe.27c68dc.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.2.rstmgknbahw.exe.27c68dc.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.2.rstmgknbahw.exe.38d3258.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.rstmgknbahw.exe.38d3258.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.2.rstmgknbahw.exe.38d3258.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.2.INQUIRY.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.INQUIRY.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.2.INQUIRY.exe.415058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.2.INQUIRY.exe.39a98c0.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.INQUIRY.exe.39a98c0.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.0.INQUIRY.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.0.INQUIRY.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.0.INQUIRY.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.2.INQUIRY.exe.782558.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.INQUIRY.exe.782558.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.2.INQUIRY.exe.782558.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.0.rstmgknbahw.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.0.rstmgknbahw.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.0.rstmgknbahw.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.rstmgknbahw.exe.38d3258.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.rstmgknbahw.exe.38d3258.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.2.rstmgknbahw.exe.38d3258.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.2.rstmgknbahw.exe.3820e14.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.2.rstmgknbahw.exe.3820e14.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.2.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.2.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.2.INQUIRY.exe.2520000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.2.INQUIRY.exe.2520000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.2.INQUIRY.exe.2520000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.0.rstmgknbahw.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.0.rstmgknbahw.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.0.rstmgknbahw.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 1.2.INQUIRY.exe.22e0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 1.2.INQUIRY.exe.22e0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 1.2.INQUIRY.exe.22e0000.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.2.rstmgknbahw.exe.4940000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.2.rstmgknbahw.exe.4940000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.2.rstmgknbahw.exe.4940000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.2.rstmgknbahw.exe.37a3258.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.2.rstmgknbahw.exe.37a3258.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.2.rstmgknbahw.exe.37a3258.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.0.rstmgknbahw.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.0.rstmgknbahw.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.0.INQUIRY.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.0.INQUIRY.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.0.INQUIRY.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.0.rstmgknbahw.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 3.2.rstmgknbahw.exe.2300000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 3.2.rstmgknbahw.exe.2300000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 3.2.rstmgknbahw.exe.2300000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 2.0.INQUIRY.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 2.0.INQUIRY.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 2.0.INQUIRY.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.0.rstmgknbahw.exe.415058.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.0.rstmgknbahw.exe.415058.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.0.rstmgknbahw.exe.415058.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 5.2.rstmgknbahw.exe.2400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 5.2.rstmgknbahw.exe.2400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 5.2.rstmgknbahw.exe.2400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.0.rstmgknbahw.exe.400000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.0.rstmgknbahw.exe.400000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.0.rstmgknbahw.exe.400000.11.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 6.2.rstmgknbahw.exe.638d50.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 6.2.rstmgknbahw.exe.638d50.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 6.2.rstmgknbahw.exe.638d50.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.0.rstmgknbahw.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.0.rstmgknbahw.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 4.0.rstmgknbahw.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000005.00000002.719731750.0000000002400000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000005.00000002.719731750.0000000002400000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000005.00000002.719731750.0000000002400000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000002.00000000.662575253.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000002.00000000.662575253.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000002.00000002.918404744.0000000002522000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000002.00000002.918404744.0000000002522000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000006.00000002.735100285.0000000004940000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000006.00000002.735100285.0000000004940000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000006.00000002.735100285.0000000004940000.00000004.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000001.00000002.665449354.00000000022E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000001.00000002.665449354.00000000022E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000001.00000002.665449354.00000000022E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000002.00000002.917467270.0000000000774000.00000004.00000020.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000002.00000002.917467270.0000000000774000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000004.00000001.703365040.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000004.00000001.703365040.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000004.00000001.703365040.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000004.00000002.723024476.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000004.00000002.723024476.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000004.00000002.723024476.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000006.00000000.716081773.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000006.00000000.716081773.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000006.00000001.718977051.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000006.00000001.718977051.0000000000414000.00000040.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000006.00000002.734941801.00000000027AE000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000004.00000002.725072072.0000000002510000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000004.00000002.725072072.0000000002510000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000004.00000002.725072072.0000000002510000.00000004.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000004.00000002.725158787.00000000038D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000004.00000002.725158787.00000000038D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000004.00000002.725196610.000000000390A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000006.00000002.735022366.00000000037DA000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000006.00000002.734234340.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000006.00000002.734234340.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000006.00000002.734234340.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000003.00000002.704939952.0000000002300000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000003.00000002.704939952.0000000002300000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000003.00000002.704939952.0000000002300000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000004.00000002.725133013.00000000028DE000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000002.00000002.916471993.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000002.00000002.916471993.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000002.00000002.916471993.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000006.00000002.735138898.0000000004982000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000006.00000002.735138898.0000000004982000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000006.00000002.734386129.0000000000625000.00000004.00000020.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000006.00000002.734386129.0000000000625000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000006.00000002.734985665.00000000037A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000006.00000002.734985665.00000000037A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000004.00000000.701936247.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000004.00000000.701936247.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000002.00000000.663644960.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000002.00000000.663644960.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000004.00000002.724570206.00000000006C5000.00000004.00000020.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000004.00000002.724570206.00000000006C5000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000006.00000000.718272419.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000006.00000000.718272419.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000004.00000000.702725030.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000004.00000000.702725030.0000000000414000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000004.00000002.725281266.00000000049D2000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000004.00000002.725281266.00000000049D2000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000002.00000002.918375056.00000000024E0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000002.00000002.918375056.00000000024E0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000002.00000002.918375056.00000000024E0000.00000004.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: INQUIRY.exe PID: 6904, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: INQUIRY.exe PID: 6904, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: INQUIRY.exe PID: 7084, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: INQUIRY.exe PID: 7084, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: rstmgknbahw.exe PID: 1904, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: rstmgknbahw.exe PID: 1904, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: rstmgknbahw.exe PID: 5320, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: rstmgknbahw.exe PID: 5320, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_00403225 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 5_2_00403225 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_0040604C
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_00404772
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_021A0B88
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_2_0040A2A5
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_2_02553850
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_2_025523A0
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_2_02552FA8
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_2_0255306F
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_1_0040A2A5
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 5_2_0040604C
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 5_2_00404772
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_2_0040A2A5
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_2_00AB0700
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_2_049E2FA8
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_2_049E23A0
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_2_049E306F
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_1_0040A2A5
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: String function: 00401ED0 appears 92 times
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: String function: 004056B5 appears 32 times
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: String function: 0040569E appears 72 times
      Source: INQUIRY.exe, 00000001.00000003.654638153.00000000034CF000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs INQUIRY.exe
      Source: INQUIRY.exe, 00000001.00000003.658531644.0000000003336000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs INQUIRY.exe
      Source: INQUIRY.exe, 00000002.00000002.918484295.0000000002911000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs INQUIRY.exe
      Source: INQUIRY.exe, 00000002.00000002.918797240.00000000039A2000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs INQUIRY.exe
      Source: INQUIRY.exe, 00000002.00000002.918797240.00000000039A2000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs INQUIRY.exe
      Source: INQUIRY.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: rstmgknbahw.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: C:\Users\user\Desktop\INQUIRY.exeFile read: C:\Users\user\Desktop\INQUIRY.exeJump to behavior
      Source: INQUIRY.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\INQUIRY.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Users\user\Desktop\INQUIRY.exe "C:\Users\user\Desktop\INQUIRY.exe"
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess created: C:\Users\user\Desktop\INQUIRY.exe "C:\Users\user\Desktop\INQUIRY.exe"
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe "C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe"
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess created: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe "C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe"
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe "C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe"
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess created: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe "C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe"
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess created: C:\Users\user\Desktop\INQUIRY.exe "C:\Users\user\Desktop\INQUIRY.exe"
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess created: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe "C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe"
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess created: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe "C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe"
      Source: C:\Users\user\Desktop\INQUIRY.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
      Source: C:\Users\user\Desktop\INQUIRY.exeFile created: C:\Users\user\AppData\Roaming\sspgadrjncoyJump to behavior
      Source: C:\Users\user\Desktop\INQUIRY.exeFile created: C:\Users\user\AppData\Local\Temp\nsc48D4.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@9/12@20/1
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_00402012 CoCreateInstance,MultiByteToWideChar,
      Source: C:\Users\user\Desktop\INQUIRY.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_00404275 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
      Source: 4.2.rstmgknbahw.exe.49d0000.9.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 4.2.rstmgknbahw.exe.49d0000.9.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 2.2.INQUIRY.exe.2520000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 2.2.INQUIRY.exe.2520000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: 6.2.rstmgknbahw.exe.4980000.9.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
      Source: 6.2.rstmgknbahw.exe.4980000.9.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
      Source: C:\Users\user\Desktop\INQUIRY.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\INQUIRY.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Users\user\Desktop\INQUIRY.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\INQUIRY.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{b46b5964-4830-4c6b-9df5-a21557a1e56d}
      Source: C:\Users\user\Desktop\INQUIRY.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_2_00401489 GetModuleHandleW,GetModuleHandleW,FindResourceW,GetModuleHandleW,LoadResource,LockResource,GetModuleHandleW,SizeofResource,FreeResource,ExitProcess,
      Source: 2.2.INQUIRY.exe.2520000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 2.2.INQUIRY.exe.2520000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 2.2.INQUIRY.exe.2520000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: 4.2.rstmgknbahw.exe.49d0000.9.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 4.2.rstmgknbahw.exe.49d0000.9.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 4.2.rstmgknbahw.exe.49d0000.9.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: 6.2.rstmgknbahw.exe.4980000.9.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 6.2.rstmgknbahw.exe.4980000.9.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: 6.2.rstmgknbahw.exe.4980000.9.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: C:\Users\user\Desktop\INQUIRY.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
      Source: C:\Users\user\Desktop\INQUIRY.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: Binary string: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.pdb source: INQUIRY.exe, 00000002.00000002.918475302.00000000025C7000.00000004.00000040.sdmp
      Source: Binary string: C:\Windows\mscorlib.pdb] source: INQUIRY.exe, 00000002.00000002.918475302.00000000025C7000.00000004.00000040.sdmp
      Source: Binary string: mscorlib.pdb source: INQUIRY.exe, 00000002.00000002.918475302.00000000025C7000.00000004.00000040.sdmp
      Source: Binary string: mscorlib.pdbX source: INQUIRY.exe, 00000002.00000002.918475302.00000000025C7000.00000004.00000040.sdmp
      Source: Binary string: wntdll.pdbUGP source: INQUIRY.exe, 00000001.00000003.662943536.00000000033B0000.00000004.00000001.sdmp, INQUIRY.exe, 00000001.00000003.659087283.0000000003220000.00000004.00000001.sdmp, rstmgknbahw.exe, 00000003.00000003.702841984.00000000030F0000.00000004.00000001.sdmp, rstmgknbahw.exe, 00000003.00000003.698655774.0000000003280000.00000004.00000001.sdmp, rstmgknbahw.exe, 00000005.00000003.709826822.00000000030E0000.00000004.00000001.sdmp, rstmgknbahw.exe, 00000005.00000003.711484064.0000000003270000.00000004.00000001.sdmp
      Source: Binary string: wntdll.pdb source: INQUIRY.exe, 00000001.00000003.662943536.00000000033B0000.00000004.00000001.sdmp, INQUIRY.exe, 00000001.00000003.659087283.0000000003220000.00000004.00000001.sdmp, rstmgknbahw.exe, 00000003.00000003.702841984.00000000030F0000.00000004.00000001.sdmp, rstmgknbahw.exe, 00000003.00000003.698655774.0000000003280000.00000004.00000001.sdmp, rstmgknbahw.exe, 00000005.00000003.709826822.00000000030E0000.00000004.00000001.sdmp, rstmgknbahw.exe, 00000005.00000003.711484064.0000000003270000.00000004.00000001.sdmp
      Source: Binary string: indows\mscorlib.pdbpdblib.pdb source: INQUIRY.exe, 00000002.00000002.918475302.00000000025C7000.00000004.00000040.sdmp
      Source: Binary string: \??\C:\Windows\mscorlib.pdb source: INQUIRY.exe, 00000002.00000002.918001760.0000000000807000.00000004.00000020.sdmp
      Source: Binary string: C:\Windows\dll\mscorlib.pdb source: INQUIRY.exe, 00000002.00000002.918475302.00000000025C7000.00000004.00000040.sdmp
      Source: Binary string: rlib.pdb source: INQUIRY.exe, 00000002.00000002.918475302.00000000025C7000.00000004.00000040.sdmp
      Source: Binary string: C:\Windows\symbols\dll\mscorlib.pdb source: INQUIRY.exe, 00000002.00000002.918475302.00000000025C7000.00000004.00000040.sdmp

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\INQUIRY.exeUnpacked PE file: 2.2.INQUIRY.exe.2520000.4.unpack
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeUnpacked PE file: 6.2.rstmgknbahw.exe.4980000.9.unpack
      Source: 2.2.INQUIRY.exe.2520000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 2.2.INQUIRY.exe.2520000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 4.2.rstmgknbahw.exe.49d0000.9.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 4.2.rstmgknbahw.exe.49d0000.9.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 6.2.rstmgknbahw.exe.4980000.9.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 6.2.rstmgknbahw.exe.4980000.9.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_008166AD push edi; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_008166AD push edi; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_008166AD push edi; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00812001 pushad ; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00812001 pushad ; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00812001 pushad ; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00813A15 pushfd ; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00813A15 pushfd ; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00813A15 pushfd ; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00812145 push eax; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00812145 push eax; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00812145 push eax; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_008166AD push edi; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_008166AD push edi; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_008166AD push edi; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00812001 pushad ; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00812001 pushad ; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00812001 pushad ; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00813A15 pushfd ; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00813A15 pushfd ; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00813A15 pushfd ; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00812145 push eax; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00812145 push eax; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00812145 push eax; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_008166AD push edi; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_008166AD push edi; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_008166AD push edi; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00812001 pushad ; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00812001 pushad ; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00812001 pushad ; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 2_3_00813A15 pushfd ; iretd
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
      Source: 2.2.INQUIRY.exe.2520000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 2.2.INQUIRY.exe.2520000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 4.2.rstmgknbahw.exe.49d0000.9.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 4.2.rstmgknbahw.exe.49d0000.9.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: 6.2.rstmgknbahw.exe.4980000.9.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 6.2.rstmgknbahw.exe.4980000.9.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Users\user\Desktop\INQUIRY.exeFile created: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeJump to dropped file
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeFile created: C:\Users\user\AppData\Local\Temp\nsz814B.tmp\gerys.dllJump to dropped file
      Source: C:\Users\user\Desktop\INQUIRY.exeFile created: C:\Users\user\AppData\Local\Temp\nsc48D6.tmp\gerys.dllJump to dropped file
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeFile created: C:\Users\user\AppData\Local\Temp\nsv9D9D.tmp\gerys.dllJump to dropped file
      Source: C:\Users\user\Desktop\INQUIRY.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run earywJump to behavior
      Source: C:\Users\user\Desktop\INQUIRY.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run earywJump to behavior

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Users\user\Desktop\INQUIRY.exeFile opened: C:\Users\user\Desktop\INQUIRY.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\INQUIRY.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcess
      Source: C:\Users\user\Desktop\INQUIRY.exe TID: 4728Thread sleep time: -1844674407370954s >= -30000s
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe TID: 6512Thread sleep time: -30000s >= -30000s
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe TID: 5156Thread sleep count: 43 > 30
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe TID: 5992Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe TID: 2440Thread sleep time: -30000s >= -30000s
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe TID: 3136Thread sleep count: 35 > 30
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe TID: 6656Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\INQUIRY.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\INQUIRY.exeWindow / User API: threadDelayed 384
      Source: C:\Users\user\Desktop\INQUIRY.exeWindow / User API: foregroundWindowGot 965
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeAPI coverage: 9.8 %
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_00405D7C FindFirstFileA,FindClose,
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_00402630 FindFirstFileA,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_2_00404A29 FindFirstFileExW,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_1_00404A29 FindFirstFileExW,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 5_2_00405D7C FindFirstFileA,FindClose,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 5_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 5_2_00402630 FindFirstFileA,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_2_00404A29 FindFirstFileExW,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_1_00404A29 FindFirstFileExW,
      Source: C:\Users\user\Desktop\INQUIRY.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\INQUIRY.exeAPI call chain: ExitProcess graph end node
      Source: C:\Users\user\Desktop\INQUIRY.exeAPI call chain: ExitProcess graph end node
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeAPI call chain: ExitProcess graph end node
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeAPI call chain: ExitProcess graph end node
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeAPI call chain: ExitProcess graph end node
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeAPI call chain: ExitProcess graph end node
      Source: INQUIRY.exe, 00000002.00000003.878664551.0000000000813000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.774619446.0000000000812000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.825484373.0000000000812000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.891624321.0000000000813000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.733579764.000000000080D000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.759637821.0000000000812000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.683832715.0000000000816000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.878647519.0000000000813000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.670540587.0000000000816000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.786041516.0000000000812000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.825616062.0000000000815000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.865016296.0000000000813000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.705623191.000000000080B000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllz
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_2_004067FE GetProcessHeap,
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_021A0402 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_021A0616 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_021A0706 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_021A0744 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_021A06C7 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_2_004035F1 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_1_004035F1 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_2_004035F1 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_1_004035F1 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\INQUIRY.exeMemory allocated: page read and write | page guard
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_2_00401E1D SetUnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_2_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_2_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_1_00401E1D SetUnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_1_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_1_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_1_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_2_00401E1D SetUnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_2_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_2_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_1_00401E1D SetUnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_1_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_1_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 6_1_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\INQUIRY.exeMemory written: C:\Users\user\Desktop\INQUIRY.exe base: 400000 value starts with: 4D5A
      Source: C:\Users\user\Desktop\INQUIRY.exeProcess created: C:\Users\user\Desktop\INQUIRY.exe "C:\Users\user\Desktop\INQUIRY.exe"
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess created: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe "C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe"
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeProcess created: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe "C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe"
      Source: INQUIRY.exe, 00000002.00000002.917971257.00000000007D9000.00000004.00000020.sdmpBinary or memory string: X"~Program Manager$
      Source: INQUIRY.exe, 00000002.00000002.918728460.0000000002B90000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000002.917971257.00000000007D9000.00000004.00000020.sdmp, INQUIRY.exe, 00000002.00000002.918737998.0000000002B9A000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000002.918267849.0000000000E50000.00000002.00020000.sdmp, INQUIRY.exe, 00000002.00000002.918753295.0000000002BB6000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000002.918570208.00000000029AC000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000002.918544054.000000000299F000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000002.918712708.0000000002B8A000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000002.918560831.00000000029A7000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: INQUIRY.exe, 00000002.00000002.918267849.0000000000E50000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: INQUIRY.exe, 00000002.00000002.918267849.0000000000E50000.00000002.00020000.sdmpBinary or memory string: Progman
      Source: INQUIRY.exe, 00000002.00000002.918267849.0000000000E50000.00000002.00020000.sdmpBinary or memory string: Progmanlock
      Source: INQUIRY.exe, 00000002.00000003.825484373.0000000000812000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.733579764.000000000080D000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.759637821.0000000000812000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.683832715.0000000000816000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.670540587.0000000000816000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.825616062.0000000000815000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.865016296.0000000000813000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.705623191.000000000080B000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.812351194.0000000000812000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.838969103.0000000000812000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.838991506.0000000000814000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.856693810.0000000000812000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.697406169.0000000000816000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.825517657.0000000000814000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.718632163.000000000080D000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.747066430.0000000000812000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.710595291.0000000000812000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.692336980.0000000000814000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.799544616.0000000000812000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000003.692368806.0000000000815000.00000004.00000001.sdmpBinary or memory string: Program Managert$
      Source: INQUIRY.exe, 00000002.00000002.918518466.0000000002965000.00000004.00000001.sdmpBinary or memory string: Program Managerr
      Source: INQUIRY.exe, 00000002.00000002.918728460.0000000002B90000.00000004.00000001.sdmp, INQUIRY.exe, 00000002.00000002.918570208.00000000029AC000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: INQUIRY.exe, 00000002.00000002.918728460.0000000002B90000.00000004.00000001.sdmpBinary or memory string: Program ManagerPG
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_2_0040208D cpuid
      Source: C:\Users\user\Desktop\INQUIRY.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Source: C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exeCode function: 4_2_00401B74 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
      Source: C:\Users\user\Desktop\INQUIRY.exeCode function: 1_2_00405AA7 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.37a3258.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.415058.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.rstmgknbahw.exe.2411458.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.3820e14.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.6d8d50.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.1.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.rstmgknbahw.exe.2300000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.415058.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.415058.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.382543d.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.rstmgknbahw.exe.2311458.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.2510000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.3950e14.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.1.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.4980000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.3950e14.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.415058.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.49d0000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.4940000.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.1.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.415058.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.638d50.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.394bfde.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.415058.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.rstmgknbahw.exe.2311458.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.24e0000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.415058.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.INQUIRY.exe.22e0000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.INQUIRY.exe.22f1458.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.415058.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.415058.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.39a98c0.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.2510000.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.395543d.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.1.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.415058.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.39adee9.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.6d8d50.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.1.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.rstmgknbahw.exe.2411458.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.381bfde.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.24e0000.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.1.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.1.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.782558.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.415058.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.INQUIRY.exe.22f1458.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.rstmgknbahw.exe.2400000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.38d3258.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.39a98c0.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.782558.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.38d3258.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.3820e14.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.2520000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.INQUIRY.exe.22e0000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.4940000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.37a3258.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.rstmgknbahw.exe.2300000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.415058.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.rstmgknbahw.exe.2400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.638d50.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000005.00000002.719731750.0000000002400000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000000.662575253.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.918404744.0000000002522000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.735100285.0000000004940000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.665449354.00000000022E0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.917467270.0000000000774000.00000004.00000020.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000001.703365040.0000000000400000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.723024476.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000000.716081773.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000001.718977051.0000000000414000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.725072072.0000000002510000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.725158787.00000000038D1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.725196610.000000000390A000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.735022366.00000000037DA000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.734234340.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.704939952.0000000002300000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.916471993.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.735138898.0000000004982000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.734386129.0000000000625000.00000004.00000020.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.734985665.00000000037A1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000000.701936247.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000000.663644960.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.724570206.00000000006C5000.00000004.00000020.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000000.718272419.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000000.702725030.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.725281266.00000000049D2000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.918375056.00000000024E0000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.918797240.00000000039A2000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: INQUIRY.exe PID: 6904, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: INQUIRY.exe PID: 7084, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: rstmgknbahw.exe PID: 1904, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: rstmgknbahw.exe PID: 5320, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: INQUIRY.exe, 00000001.00000002.665449354.00000000022E0000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: INQUIRY.exe, 00000002.00000000.662575253.0000000000414000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: INQUIRY.exe, 00000002.00000002.918404744.0000000002522000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: INQUIRY.exe, 00000002.00000002.917467270.0000000000774000.00000004.00000020.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: INQUIRY.exe, 00000002.00000002.918484295.0000000002911000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: INQUIRY.exe, 00000002.00000002.918484295.0000000002911000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: INQUIRY.exe, 00000002.00000002.916471993.0000000000400000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: INQUIRY.exe, 00000002.00000002.918375056.00000000024E0000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: INQUIRY.exe, 00000002.00000002.918797240.00000000039A2000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: rstmgknbahw.exeString found in binary or memory: NanoCore.ClientPluginHost
      Source: rstmgknbahw.exe, 00000004.00000001.703365040.0000000000400000.00000040.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: rstmgknbahw.exe, 00000004.00000002.723024476.0000000000400000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: rstmgknbahw.exe, 00000004.00000002.725072072.0000000002510000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: rstmgknbahw.exe, 00000004.00000002.725158787.00000000038D1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: rstmgknbahw.exe, 00000004.00000002.725196610.000000000390A000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: rstmgknbahw.exe, 00000004.00000002.725196610.000000000390A000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: rstmgknbahw.exe, 00000004.00000002.725133013.00000000028DE000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: rstmgknbahw.exe, 00000004.00000002.725133013.00000000028DE000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: rstmgknbahw.exe, 00000004.00000000.701936247.0000000000414000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: rstmgknbahw.exe, 00000004.00000002.724570206.00000000006C5000.00000004.00000020.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: rstmgknbahw.exe, 00000004.00000002.725281266.00000000049D2000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: rstmgknbahw.exeString found in binary or memory: NanoCore.ClientPluginHost
      Source: rstmgknbahw.exe, 00000006.00000002.735100285.0000000004940000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: rstmgknbahw.exe, 00000006.00000000.716081773.0000000000414000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: rstmgknbahw.exe, 00000006.00000002.734941801.00000000027AE000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: rstmgknbahw.exe, 00000006.00000002.734941801.00000000027AE000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: rstmgknbahw.exe, 00000006.00000002.735022366.00000000037DA000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: rstmgknbahw.exe, 00000006.00000002.735022366.00000000037DA000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: rstmgknbahw.exe, 00000006.00000002.734234340.0000000000400000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: rstmgknbahw.exe, 00000006.00000002.735138898.0000000004982000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: rstmgknbahw.exe, 00000006.00000002.734985665.00000000037A1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.37a3258.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.415058.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.rstmgknbahw.exe.2411458.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.3820e14.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.6d8d50.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.1.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.rstmgknbahw.exe.2300000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.415058.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.415058.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.382543d.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.rstmgknbahw.exe.2311458.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.2510000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.3950e14.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.1.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.4980000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.3950e14.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.415058.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.49d0000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.4940000.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.1.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.415058.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.638d50.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.394bfde.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.415058.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.9.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.rstmgknbahw.exe.2311458.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.24e0000.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.415058.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.INQUIRY.exe.22e0000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.400000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.INQUIRY.exe.22f1458.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.415058.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.415058.12.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.39a98c0.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.2510000.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.395543d.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.1.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.415058.10.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.39adee9.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.6d8d50.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.1.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.rstmgknbahw.exe.2411458.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.381bfde.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.24e0000.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.1.rstmgknbahw.exe.415058.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.1.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.782558.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.415058.10.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.INQUIRY.exe.22f1458.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.rstmgknbahw.exe.2400000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.38d3258.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.415058.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.39a98c0.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.782558.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.38d3258.5.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.3820e14.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.rstmgknbahw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.2.INQUIRY.exe.2520000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 1.2.INQUIRY.exe.22e0000.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.4940000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.37a3258.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.rstmgknbahw.exe.2300000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 2.0.INQUIRY.exe.400000.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.415058.12.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.rstmgknbahw.exe.2400000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.0.rstmgknbahw.exe.400000.11.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 6.2.rstmgknbahw.exe.638d50.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.0.rstmgknbahw.exe.400000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000005.00000002.719731750.0000000002400000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000000.662575253.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.918404744.0000000002522000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.735100285.0000000004940000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.665449354.00000000022E0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.917467270.0000000000774000.00000004.00000020.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000001.703365040.0000000000400000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.723024476.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000000.716081773.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000001.718977051.0000000000414000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.725072072.0000000002510000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.725158787.00000000038D1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.725196610.000000000390A000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.735022366.00000000037DA000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.734234340.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.704939952.0000000002300000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.916471993.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.735138898.0000000004982000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.734386129.0000000000625000.00000004.00000020.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.734985665.00000000037A1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000000.701936247.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000000.663644960.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.724570206.00000000006C5000.00000004.00000020.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000000.718272419.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000000.702725030.0000000000414000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.725281266.00000000049D2000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.918375056.00000000024E0000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.918797240.00000000039A2000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: INQUIRY.exe PID: 6904, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: INQUIRY.exe PID: 7084, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: rstmgknbahw.exe PID: 1904, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: rstmgknbahw.exe PID: 5320, type: MEMORYSTR
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts11
      Native API
      1
      Registry Run Keys / Startup Folder
      112
      Process Injection
      1
      Disable or Modify Tools
      11
      Input Capture
      1
      System Time Discovery
      Remote Services11
      Archive Collected Data
      Exfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
      System Shutdown/Reboot
      Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      Registry Run Keys / Startup Folder
      11
      Deobfuscate/Decode Files or Information
      LSASS Memory2
      File and Directory Discovery
      Remote Desktop Protocol11
      Input Capture
      Exfiltration Over Bluetooth1
      Non-Standard Port
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
      Obfuscated Files or Information
      Security Account Manager15
      System Information Discovery
      SMB/Windows Admin Shares1
      Clipboard Data
      Automated Exfiltration1
      Remote Access Software
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)21
      Software Packing
      NTDS21
      Security Software Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer1
      Non-Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
      Masquerading
      LSA Secrets2
      Process Discovery
      SSHKeyloggingData Transfer Size Limits21
      Application Layer Protocol
      Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.common21
      Virtualization/Sandbox Evasion
      Cached Domain Credentials21
      Virtualization/Sandbox Evasion
      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup Items112
      Process Injection
      DCSync1
      Application Window Discovery
      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
      Hidden Files and Directories
      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 558450 Sample: INQUIRY.exe Startdate: 24/01/2022 Architecture: WINDOWS Score: 100 36 onyeoma.ddns.net 2->36 42 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->42 44 Found malware configuration 2->44 46 Malicious sample detected (through community Yara rule) 2->46 48 7 other signatures 2->48 7 INQUIRY.exe 1 21 2->7         started        11 rstmgknbahw.exe 17 2->11         started        13 rstmgknbahw.exe 17 2->13         started        signatures3 process4 file5 28 C:\Users\user\AppData\...\rstmgknbahw.exe, PE32 7->28 dropped 30 C:\Users\user\AppData\Local\...\gerys.dll, PE32 7->30 dropped 50 Detected unpacking (creates a PE file in dynamic memory) 7->50 52 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 7->52 54 Injects a PE file into a foreign processes 7->54 15 INQUIRY.exe 9 7->15         started        32 C:\Users\user\AppData\Local\...\gerys.dll, PE32 11->32 dropped 56 Machine Learning detection for dropped file 11->56 20 rstmgknbahw.exe 3 11->20         started        34 C:\Users\user\AppData\Local\...\gerys.dll, PE32 13->34 dropped 22 rstmgknbahw.exe 2 13->22         started        signatures6 process7 dnsIp8 38 onyeoma.ddns.net 185.140.53.6, 4141, 49735, 49742 DAVID_CRAIGGG Sweden 15->38 24 C:\Users\user\AppData\Roaming\...\run.dat, data 15->24 dropped 40 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->40 26 C:\Users\user\AppData\...\rstmgknbahw.exe.log, ASCII 20->26 dropped file9 signatures10

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      INQUIRY.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLinkDownload
      4.0.rstmgknbahw.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      1.2.INQUIRY.exe.30e0000.5.unpack100%AviraTR/Patched.Ren.GenDownload File
      2.0.INQUIRY.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      2.0.INQUIRY.exe.400000.7.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      6.0.rstmgknbahw.exe.400000.7.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      2.0.INQUIRY.exe.400000.5.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      6.2.rstmgknbahw.exe.4980000.9.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      6.0.rstmgknbahw.exe.400000.9.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      4.2.rstmgknbahw.exe.49d0000.9.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      4.0.rstmgknbahw.exe.400000.9.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      2.0.INQUIRY.exe.400000.9.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      2.0.INQUIRY.exe.400000.11.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      6.0.rstmgknbahw.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      6.2.rstmgknbahw.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      6.1.rstmgknbahw.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      6.0.rstmgknbahw.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      4.0.rstmgknbahw.exe.400000.11.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      4.0.rstmgknbahw.exe.400000.7.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      4.0.rstmgknbahw.exe.400000.5.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      4.1.rstmgknbahw.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      2.2.INQUIRY.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      2.2.INQUIRY.exe.39a98c0.6.unpack100%AviraTR/NanoCore.fadteDownload File
      6.0.rstmgknbahw.exe.400000.5.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      4.2.rstmgknbahw.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      6.0.rstmgknbahw.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      2.2.INQUIRY.exe.2520000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      4.0.rstmgknbahw.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      2.0.INQUIRY.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      2.0.INQUIRY.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      6.0.rstmgknbahw.exe.400000.11.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      4.0.rstmgknbahw.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      SourceDetectionScannerLabelLink
      onyeoma.ddns.net0%VirustotalBrowse
      SourceDetectionScannerLabelLink
      onyeoma.ddns.net0%VirustotalBrowse
      onyeoma.ddns.net0%Avira URL Cloudsafe
      127.0.0.10%VirustotalBrowse
      127.0.0.10%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      onyeoma.ddns.net
      185.140.53.6
      truetrueunknown
      NameMaliciousAntivirus DetectionReputation
      onyeoma.ddns.nettrue
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      127.0.0.1true
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://nsis.sf.net/NSIS_Errorrstmgknbahw.exe, rstmgknbahw.exe, 00000005.00000002.719289522.0000000000409000.00000004.00020000.sdmp, rstmgknbahw.exe, 00000005.00000000.695461777.0000000000409000.00000008.00020000.sdmp, rstmgknbahw.exe, 00000006.00000000.707759536.0000000000409000.00000008.00020000.sdmp, INQUIRY.exe, rstmgknbahw.exe.1.drfalse
        high
        http://nsis.sf.net/NSIS_ErrorErrorINQUIRY.exe, rstmgknbahw.exe.1.drfalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          185.140.53.6
          onyeoma.ddns.netSweden
          209623DAVID_CRAIGGGtrue
          Joe Sandbox Version:34.0.0 Boulder Opal
          Analysis ID:558450
          Start date:24.01.2022
          Start time:02:23:21
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 10m 26s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:INQUIRY.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:21
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@9/12@20/1
          EGA Information:
          • Successful, ratio: 83.3%
          HDC Information:
          • Successful, ratio: 71.6% (good quality ratio 66.4%)
          • Quality average: 75.8%
          • Quality standard deviation: 31.1%
          HCA Information:
          • Successful, ratio: 85%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .exe
          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
          • TCP Packets have been reduced to 100
          • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
          • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, store-images.s-microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
          • Execution Graph export aborted for target INQUIRY.exe, PID 7084 because there are no executed function
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          TimeTypeDescription
          02:24:15AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run earyw C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe
          02:24:18API Interceptor962x Sleep call for process: INQUIRY.exe modified
          02:24:23AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run earyw C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe
          02:24:29API Interceptor2x Sleep call for process: rstmgknbahw.exe modified
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):525
          Entropy (8bit):5.2874233355119316
          Encrypted:false
          SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
          MD5:61CCF53571C9ABA6511D696CB0D32E45
          SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
          SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
          SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
          Malicious:true
          Reputation:high, very likely benign file
          Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
          Process:C:\Users\user\Desktop\INQUIRY.exe
          File Type:data
          Category:dropped
          Size (bytes):278527
          Entropy (8bit):7.986066778609259
          Encrypted:false
          SSDEEP:6144:TYEMx0q3EXCouk+eWWP1QbXva183aCT0B/ER78PemFd/1X:TYxZ3Q8Heldu4IaCTm/HX59
          MD5:16FC364F28AB0F84C023E255CE6B0793
          SHA1:BD610A8C17B0A5C0C0AF67542F7533271229F584
          SHA-256:167379B6A1CD5727CCA9F6891B4A58FF06C42490E61D7AE7F8AAFD26F05D1B38
          SHA-512:D042B54CA997370F3B86FF5567D956489FF7FF9EED92CF5822FE6CDCDB1FB88EC37011E2F6D498BFBD6811CF6C668C0DADD68FFE58642C6B82842B32E2AA75CC
          Malicious:false
          Reputation:low
          Preview:..8..'......".8.`.;Z.t.~.......R._..![...j9B..[f.E$<R&.(.=...P..*{m..-.]..G.#..'...D.)...~`..."...{.0...5U.L.L....?A.p.5.3tw....6...|VW.u$..\..7.....v..tTK..<?..cf..:..-..2..g.............j.].A....n.~..Ne-.#='..#......5fGeG..k...6.5~A.3.|Y.C+...&..YF..'..^..R..8...Z.t.........k.._.![...j9B.U.f.E.<R&.(...V..t..{....(].\Wbf.J....w.........s.......$.Dxy.G.0.K.Cp.5V3tw.~z...[.a..@.|.{..!.G[....$.s|...dRg-Q....._.......w..u).....2.\.8sw.=..E.L..g...y.v....f.u.....j....$Wv.(lS.....C+...&.j.pN.'......!.8.J.;Z.t........R....y./g.i$B.2zf.E.<R&.(.."......{2...(..|Wb..Z...w.....l.....s.Xc....$.9xy.G*0.6K...UO..tw.~z..#..Y0%@h..{.#........$.!|.=.[|JQ..J..j..{.w......u)......\k8sw.=..6....g...y.v....fTu.....j....$Wv.(lS.....C+...&..YF..'.....M.8.`.;Z.t........R._..![...j9B..[f.E$<R&.(.........{2...(..\Wbf.Jo...w........s.....$.9xy.G*0.6K.Cp.5.3tw.~z...[.Y.%@h|.{.#........$.s|...dRg-Q....._..{r...w..u).....2.\.8sw.=..6....g...y.v....fTu.....
          Process:C:\Users\user\Desktop\INQUIRY.exe
          File Type:data
          Category:dropped
          Size (bytes):328199
          Entropy (8bit):7.763501353201283
          Encrypted:false
          SSDEEP:6144:KU0YEMx0q3EXCouk+eWWP1QbXva183aCT0B/ER78PemFd/1OF2:QYxZ3Q8Heldu4IaCTm/HX5q2
          MD5:6EB0F8E8E159CC6BE6F7C45CA7B714F2
          SHA1:85A286A84D5344F29261BAC2622C98F61DC3BC6A
          SHA-256:F85D1A62A230E16ACCF48069072C12F4EDD62350375FF21AF97257AC90CF8874
          SHA-512:D6D0EA566DC37B961F2A16BF6BC892B261B92183C3BDB709F2B895E2BBA6E3E8DE1AD4A7D99767ECEA5890A364FA759DFD7E3C274F4B2080BBF9C3624A668544
          Malicious:false
          Reputation:low
          Preview:.\......,...................F...lE.......[......m\..........................................................................................................................................................................................................................................J...............#...j...........................................................................................................................................$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\INQUIRY.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):18432
          Entropy (8bit):5.728423253996569
          Encrypted:false
          SSDEEP:384:fWrH9a+lIcHqWIHcJALBQNdZCvSdQkU7kO0Kkqb:0nlIfWILoLUSdQHkJKT
          MD5:964F57C518C022C62A555DEB4E48D02E
          SHA1:B71006B1850415DDF27B656A18382963EDBD4C9D
          SHA-256:DAAEED4ABBDCB59F82CB65AC2C32929E52E821E9068A2B453ABD3118DF1E9378
          SHA-512:296D4B41119F294E4D86B7CA5EE395C05F3AD9520B98391DACD34AECCCB733092DB7134CBA935863D5E45235C593171B71D8507292AD44E6B9FE8BD6BF5C20C0
          Malicious:false
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Q...0...0...0...[...0...0...0..Ln...0..Ln...0..In...0..Ln...0..Rich.0..........................PE..L......a...........!.....8...................P............................................@..........................P..H...8Q.......`.......................p..p....................................................P...............................text....6.......8.................. ..`.rdata..&....P.......<..............@..@.rsrc........`.......D..............@..@.reloc..p....p.......F..............@..B................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe
          File Type:data
          Category:dropped
          Size (bytes):328199
          Entropy (8bit):7.763501353201283
          Encrypted:false
          SSDEEP:6144:KU0YEMx0q3EXCouk+eWWP1QbXva183aCT0B/ER78PemFd/1OF2:QYxZ3Q8Heldu4IaCTm/HX5q2
          MD5:6EB0F8E8E159CC6BE6F7C45CA7B714F2
          SHA1:85A286A84D5344F29261BAC2622C98F61DC3BC6A
          SHA-256:F85D1A62A230E16ACCF48069072C12F4EDD62350375FF21AF97257AC90CF8874
          SHA-512:D6D0EA566DC37B961F2A16BF6BC892B261B92183C3BDB709F2B895E2BBA6E3E8DE1AD4A7D99767ECEA5890A364FA759DFD7E3C274F4B2080BBF9C3624A668544
          Malicious:false
          Reputation:low
          Preview:.\......,...................F...lE.......[......m\..........................................................................................................................................................................................................................................J...............#...j...........................................................................................................................................$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):18432
          Entropy (8bit):5.728423253996569
          Encrypted:false
          SSDEEP:384:fWrH9a+lIcHqWIHcJALBQNdZCvSdQkU7kO0Kkqb:0nlIfWILoLUSdQHkJKT
          MD5:964F57C518C022C62A555DEB4E48D02E
          SHA1:B71006B1850415DDF27B656A18382963EDBD4C9D
          SHA-256:DAAEED4ABBDCB59F82CB65AC2C32929E52E821E9068A2B453ABD3118DF1E9378
          SHA-512:296D4B41119F294E4D86B7CA5EE395C05F3AD9520B98391DACD34AECCCB733092DB7134CBA935863D5E45235C593171B71D8507292AD44E6B9FE8BD6BF5C20C0
          Malicious:false
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Q...0...0...0...[...0...0...0..Ln...0..Ln...0..In...0..Ln...0..Rich.0..........................PE..L......a...........!.....8...................P............................................@..........................P..H...8Q.......`.......................p..p....................................................P...............................text....6.......8.................. ..`.rdata..&....P.......<..............@..@.rsrc........`.......D..............@..@.reloc..p....p.......F..............@..B................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe
          File Type:data
          Category:dropped
          Size (bytes):328199
          Entropy (8bit):7.763501353201283
          Encrypted:false
          SSDEEP:6144:KU0YEMx0q3EXCouk+eWWP1QbXva183aCT0B/ER78PemFd/1OF2:QYxZ3Q8Heldu4IaCTm/HX5q2
          MD5:6EB0F8E8E159CC6BE6F7C45CA7B714F2
          SHA1:85A286A84D5344F29261BAC2622C98F61DC3BC6A
          SHA-256:F85D1A62A230E16ACCF48069072C12F4EDD62350375FF21AF97257AC90CF8874
          SHA-512:D6D0EA566DC37B961F2A16BF6BC892B261B92183C3BDB709F2B895E2BBA6E3E8DE1AD4A7D99767ECEA5890A364FA759DFD7E3C274F4B2080BBF9C3624A668544
          Malicious:false
          Reputation:low
          Preview:.\......,...................F...lE.......[......m\..........................................................................................................................................................................................................................................J...............#...j...........................................................................................................................................$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):18432
          Entropy (8bit):5.728423253996569
          Encrypted:false
          SSDEEP:384:fWrH9a+lIcHqWIHcJALBQNdZCvSdQkU7kO0Kkqb:0nlIfWILoLUSdQHkJKT
          MD5:964F57C518C022C62A555DEB4E48D02E
          SHA1:B71006B1850415DDF27B656A18382963EDBD4C9D
          SHA-256:DAAEED4ABBDCB59F82CB65AC2C32929E52E821E9068A2B453ABD3118DF1E9378
          SHA-512:296D4B41119F294E4D86B7CA5EE395C05F3AD9520B98391DACD34AECCCB733092DB7134CBA935863D5E45235C593171B71D8507292AD44E6B9FE8BD6BF5C20C0
          Malicious:false
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Q...0...0...0...[...0...0...0..Ln...0..Ln...0..In...0..Ln...0..Rich.0..........................PE..L......a...........!.....8...................P............................................@..........................P..H...8Q.......`.......................p..p....................................................P...............................text....6.......8.................. ..`.rdata..&....P.......<..............@..@.rsrc........`.......D..............@..@.reloc..p....p.......F..............@..B................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\INQUIRY.exe
          File Type:data
          Category:dropped
          Size (bytes):7539
          Entropy (8bit):6.073593928396658
          Encrypted:false
          SSDEEP:192:dCBXlCcDOOqcG8KiqmpLiu90E6lJu96utIdlxaP:4trDOOqcGce807u0u2fxy
          MD5:7AA8D1B3501B957F963AD8B0E873510C
          SHA1:8DF70D69A3B89166FAF60D2E8BB0F2BADBA9CB10
          SHA-256:350C38CCDE959E201754E7469F8149A7548A789160B202CF6397AAF439987638
          SHA-512:0926C416DA709AE8ECB6C79A300BB2692A80541C183859C959F292B4E9201DB8937CD2E5D757318FD60311B1F1D77C3B0C93E5330BC82A5A89D0F477BE7E6874
          Malicious:false
          Reputation:low
          Preview:..qtt............tI.4.IE..I.4.IE.....t1..Lttt...t9_h9_D....ttt.....9_h9_D....ttt.....9_h9_D....ttt.,..(9_h9_D....ttt.4..0.WDpb..l|.4uu.h.......D..p%+.........p3%..D{....u...p6........%.tttt.pPo-M..9_.{9_.~9_,.|9_4.{9_.Y9_.z..`D...h...T..s_.9_..~.lIo..u...tttt1.PpUttt.pPg-..zY..Yz}..w6ht.....I.4.IE...l.t..heT.l.t.D.@3....3p...l.t..l.s.......w6ht.B.2..\vtt..vtt6@t..9...vtt.xvtt6lt.gx....vtt..vtt6lt.....LI.4.IE..1..Dttt.....W.t`B..2tt...........@ott.4`..l..l{.+t.g..g.....l{3.t.g..g..v.l|.4t.o....9...stt..*.99...I...9_l..999...W.t`r...t.q1..sttt....w6pt......I.4.IE..1..Lttt.4...W.t`B..2tt............ptt.4I..ttt.l..l{.+t.g4.g0.h..l{3.t.g4.g0.D..l{...g4.g0.@%+.l~..u.?4.?0....l{3.v.g4.g0.o.l|.4t.o4..B.2...ttt....99...W<t`l...<.s.A9_<9_@9_D9_h9_l.!.99...W.t`r...t.q1..sttt....w6@t.....81..Dttt.....W.t`B..2tt............utt.4`..l..l{.+t.g..g..h..l{3.t.g..g..v.l|.4t.o...gx...Qttt..P.99...j9_
          Process:C:\Users\user\Desktop\INQUIRY.exe
          File Type:data
          Category:dropped
          Size (bytes):232
          Entropy (8bit):7.089541637477408
          Encrypted:false
          SSDEEP:3:XrURGizD7cnRNGbgCFKRNX/pBK0jCV83ne+VdWPiKgmR7kkmefoeLBizbCuVkqYM:X4LDAnybgCFcps0OafmCYDlizZr/i/Oh
          MD5:9E7D0351E4DF94A9B0BADCEB6A9DB963
          SHA1:76C6A69B1C31CEA2014D1FD1E222A3DD1E433005
          SHA-256:AAFC7B40C5FE680A2BB549C3B90AABAAC63163F74FFFC0B00277C6BBFF88B757
          SHA-512:93CCF7E046A3C403ECF8BC4F1A8850BA0180FE18926C98B297C5214EB77BC212C8FBCC58412D0307840CF2715B63BE68BACDA95AA98E82835C5C53F17EF38511
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&
          Process:C:\Users\user\Desktop\INQUIRY.exe
          File Type:data
          Category:dropped
          Size (bytes):8
          Entropy (8bit):3.0
          Encrypted:false
          SSDEEP:3:3e8t:B
          MD5:CF0C25BF3DC4FFBB8F3E0CDC145DD33E
          SHA1:6ED58B87F71DA1F789EB1A81A6FB08C314FB508A
          SHA-256:34B778FCE744D50ADF7F57F7CA5480538294B496E425C141ED07EBC5A17CB81F
          SHA-512:D22752D21943BD8DBF30B48066B1F8DCDB139467D4352A7E114DBBBE4EB082F8A3566F0865DE93B138FDAC5FEE83D673C32D727B864419572C382EFBA8D960F8
          Malicious:true
          Preview:k=.>...H
          Process:C:\Users\user\Desktop\INQUIRY.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
          Category:dropped
          Size (bytes):315125
          Entropy (8bit):7.883283847039061
          Encrypted:false
          SSDEEP:6144:/w8yH0o3Hx8NFIImn7/q7cly7x5rYFggsIKW4BSusOM0odo5BehhFl7/:W0vII073lMhYOsKPBSusOWo5Al7/
          MD5:DC0ACC75361BB39FBD4ABEC6EDC82CD5
          SHA1:9E9C823725BEE12D0980009C04692AD9089D9308
          SHA-256:D73CBCB2D300D84618D476706765B185C12D20D2E52AFE120FB587C81BE7CC80
          SHA-512:F40CB60C1D80B09322783BFC83C34784CD28F9B6462701AA069C867986DF99DB06CB088203B02D6F6CA8CCB95FF60AE856D8B92FC2D40BC64E1134EB950CC996
          Malicious:true
          Antivirus:
          • Antivirus: Joe Sandbox ML, Detection: 100%
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........uJ...$...$...$./.{...$...%.:.$.".y...$..7....$.f."...$.Rich..$.................PE..L......H.................Z..........%2.......p....@..........................................................................s..........HA...........................................................................p...............................text...vY.......Z.................. ..`.rdata.......p.......^..............@..@.data................p..............@....ndata.......@...........................rsrc...HA.......B...t..............@..@........................................................................................................................................................................................................................................................................................................................................................
          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
          Entropy (8bit):7.883283847039061
          TrID:
          • Win32 Executable (generic) a (10002005/4) 92.16%
          • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:INQUIRY.exe
          File size:315125
          MD5:dc0acc75361bb39fbd4abec6edc82cd5
          SHA1:9e9c823725bee12d0980009c04692ad9089d9308
          SHA256:d73cbcb2d300d84618d476706765b185c12d20d2e52afe120fb587c81be7cc80
          SHA512:f40cb60c1d80b09322783bfc83c34784cd28f9b6462701aa069c867986df99db06cb088203b02d6f6ca8ccb95ff60ae856d8b92fc2d40bc64e1134eb950cc996
          SSDEEP:6144:/w8yH0o3Hx8NFIImn7/q7cly7x5rYFggsIKW4BSusOM0odo5BehhFl7/:W0vII073lMhYOsKPBSusOWo5Al7/
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........uJ...$...$...$./.{...$...%.:.$.".y...$..7....$.f."...$.Rich..$.................PE..L......H.................Z..........%2.....
          Icon Hash:0c129232d9ccc41b
          Entrypoint:0x403225
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          DLL Characteristics:
          Time Stamp:0x48EFCDC9 [Fri Oct 10 21:48:57 2008 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:099c0646ea7282d232219f8807883be0
          Instruction
          sub esp, 00000180h
          push ebx
          push ebp
          push esi
          xor ebx, ebx
          push edi
          mov dword ptr [esp+18h], ebx
          mov dword ptr [esp+10h], 00409128h
          xor esi, esi
          mov byte ptr [esp+14h], 00000020h
          call dword ptr [00407030h]
          push 00008001h
          call dword ptr [004070B4h]
          push ebx
          call dword ptr [0040727Ch]
          push 00000008h
          mov dword ptr [00423F58h], eax
          call 00007F9F28CAD860h
          mov dword ptr [00423EA4h], eax
          push ebx
          lea eax, dword ptr [esp+34h]
          push 00000160h
          push eax
          push ebx
          push 0041F450h
          call dword ptr [00407158h]
          push 004091B0h
          push 004236A0h
          call 00007F9F28CAD517h
          call dword ptr [004070B0h]
          mov edi, 00429000h
          push eax
          push edi
          call 00007F9F28CAD505h
          push ebx
          call dword ptr [0040710Ch]
          cmp byte ptr [00429000h], 00000022h
          mov dword ptr [00423EA0h], eax
          mov eax, edi
          jne 00007F9F28CAAD2Ch
          mov byte ptr [esp+14h], 00000022h
          mov eax, 00429001h
          push dword ptr [esp+14h]
          push eax
          call 00007F9F28CACFF8h
          push eax
          call dword ptr [0040721Ch]
          mov dword ptr [esp+1Ch], eax
          jmp 00007F9F28CAAD85h
          cmp cl, 00000020h
          jne 00007F9F28CAAD28h
          inc eax
          cmp byte ptr [eax], 00000020h
          je 00007F9F28CAAD1Ch
          cmp byte ptr [eax], 00000022h
          mov byte ptr [eax+eax+00h], 00000000h
          Programming Language:
          • [EXP] VC++ 6.0 SP5 build 8804
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x4148.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x59760x5a00False0.668619791667data6.46680044621IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          .rdata0x70000x11900x1200False0.444878472222data5.17796812871IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x90000x1af980x400False0.55078125data4.68983486809IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
          .ndata0x240000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .rsrc0x2c0000x41480x4200False0.209753787879data3.76510054969IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountry
          RT_ICON0x2c1f00x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 4289923840, next used block 4289923840EnglishUnited States
          RT_ICON0x2e7980x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4289923840, next used block 4289923840EnglishUnited States
          RT_ICON0x2f8400x468GLS_BINARY_LSB_FIRSTEnglishUnited States
          RT_DIALOG0x2fca80x100dataEnglishUnited States
          RT_DIALOG0x2fda80x11cdataEnglishUnited States
          RT_DIALOG0x2fec80x60dataEnglishUnited States
          RT_GROUP_ICON0x2ff280x30dataEnglishUnited States
          RT_MANIFEST0x2ff580x1ebXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
          DLLImport
          KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetFileTime, GetTempPathA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetWindowsDirectoryA
          USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
          GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
          SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
          ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
          COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
          ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
          VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
          01/24/22-02:24:20.152195UDP254DNS SPOOF query response with TTL of 1 min. and no authority53591238.8.8.8192.168.2.4
          01/24/22-02:24:20.743770TCP2025019ET TROJAN Possible NanoCore C2 60B497354141192.168.2.4185.140.53.6
          01/24/22-02:24:26.623926UDP254DNS SPOOF query response with TTL of 1 min. and no authority53545318.8.8.8192.168.2.4
          01/24/22-02:24:26.701611TCP2025019ET TROJAN Possible NanoCore C2 60B497424141192.168.2.4185.140.53.6
          01/24/22-02:24:31.333067TCP2025019ET TROJAN Possible NanoCore C2 60B497434141192.168.2.4185.140.53.6
          01/24/22-02:24:37.493200TCP2025019ET TROJAN Possible NanoCore C2 60B497504141192.168.2.4185.140.53.6
          01/24/22-02:24:43.325751UDP254DNS SPOOF query response with TTL of 1 min. and no authority53530978.8.8.8192.168.2.4
          01/24/22-02:24:43.429089TCP2025019ET TROJAN Possible NanoCore C2 60B497574141192.168.2.4185.140.53.6
          01/24/22-02:24:50.367349UDP254DNS SPOOF query response with TTL of 1 min. and no authority53623898.8.8.8192.168.2.4
          01/24/22-02:24:50.487020TCP2025019ET TROJAN Possible NanoCore C2 60B497604141192.168.2.4185.140.53.6
          01/24/22-02:24:56.459195TCP2025019ET TROJAN Possible NanoCore C2 60B497674141192.168.2.4185.140.53.6
          01/24/22-02:25:02.430704UDP254DNS SPOOF query response with TTL of 1 min. and no authority53558548.8.8.8192.168.2.4
          01/24/22-02:25:02.524995TCP2025019ET TROJAN Possible NanoCore C2 60B497744141192.168.2.4185.140.53.6
          01/24/22-02:25:08.907834UDP254DNS SPOOF query response with TTL of 1 min. and no authority53645498.8.8.8192.168.2.4
          01/24/22-02:25:08.993738TCP2025019ET TROJAN Possible NanoCore C2 60B497774141192.168.2.4185.140.53.6
          01/24/22-02:25:14.871570UDP254DNS SPOOF query response with TTL of 1 min. and no authority53631538.8.8.8192.168.2.4
          01/24/22-02:25:14.965823TCP2025019ET TROJAN Possible NanoCore C2 60B497784141192.168.2.4185.140.53.6
          01/24/22-02:25:21.071315TCP2025019ET TROJAN Possible NanoCore C2 60B497794141192.168.2.4185.140.53.6
          01/24/22-02:25:27.268831TCP2025019ET TROJAN Possible NanoCore C2 60B497824141192.168.2.4185.140.53.6
          01/24/22-02:25:33.435841UDP254DNS SPOOF query response with TTL of 1 min. and no authority53565348.8.8.8192.168.2.4
          01/24/22-02:25:33.543043TCP2025019ET TROJAN Possible NanoCore C2 60B497884141192.168.2.4185.140.53.6
          01/24/22-02:25:39.718199TCP2025019ET TROJAN Possible NanoCore C2 60B497894141192.168.2.4185.140.53.6
          01/24/22-02:25:45.786163TCP2025019ET TROJAN Possible NanoCore C2 60B497914141192.168.2.4185.140.53.6
          01/24/22-02:25:51.826837TCP2025019ET TROJAN Possible NanoCore C2 60B497924141192.168.2.4185.140.53.6
          01/24/22-02:25:58.115693TCP2025019ET TROJAN Possible NanoCore C2 60B498104141192.168.2.4185.140.53.6
          01/24/22-02:26:04.066618UDP254DNS SPOOF query response with TTL of 1 min. and no authority53506018.8.8.8192.168.2.4
          01/24/22-02:26:04.236531TCP2025019ET TROJAN Possible NanoCore C2 60B498274141192.168.2.4185.140.53.6
          01/24/22-02:26:10.220319UDP254DNS SPOOF query response with TTL of 1 min. and no authority53608758.8.8.8192.168.2.4
          01/24/22-02:26:10.485870TCP2025019ET TROJAN Possible NanoCore C2 60B498314141192.168.2.4185.140.53.6
          01/24/22-02:26:16.639258UDP254DNS SPOOF query response with TTL of 1 min. and no authority53564488.8.8.8192.168.2.4
          01/24/22-02:26:16.719867TCP2025019ET TROJAN Possible NanoCore C2 60B498334141192.168.2.4185.140.53.6
          TimestampSource PortDest PortSource IPDest IP
          Jan 24, 2022 02:24:20.164705038 CET497354141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:20.700340986 CET414149735185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:20.700464010 CET497354141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:20.743769884 CET497354141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:21.016308069 CET414149735185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:21.016460896 CET497354141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:21.349014997 CET414149735185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:21.349283934 CET497354141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:21.448935986 CET414149735185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:21.467855930 CET497354141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:21.753155947 CET414149735185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:21.753386974 CET497354141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:22.075184107 CET414149735185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:22.075364113 CET497354141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:22.369034052 CET414149735185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:22.369168997 CET497354141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:22.544080019 CET497354141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:22.647011995 CET414149735185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:22.647120953 CET497354141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:26.625017881 CET497424141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:26.700880051 CET414149742185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:26.701059103 CET497424141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:26.701611042 CET497424141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:26.815442085 CET414149742185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:31.237526894 CET497434141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:31.332380056 CET414149743185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:31.332499981 CET497434141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:31.333066940 CET497434141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:31.577058077 CET414149743185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:31.577172995 CET497434141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:31.879667997 CET414149743185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:31.879786015 CET497434141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:32.297938108 CET497434141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:32.381290913 CET414149743185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:32.886949062 CET497434141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:32.983927965 CET414149743185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:32.990437984 CET414149743185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:33.045161009 CET497434141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:33.198896885 CET497434141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:37.408591032 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:37.492502928 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:37.492675066 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:37.493200064 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:37.705472946 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:37.705645084 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:38.014137030 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:38.014259100 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:38.120289087 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:38.120460987 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:38.442538023 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:38.442656040 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:38.739780903 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:38.739892960 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:38.925431013 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:38.925496101 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:38.925570011 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:38.925636053 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.027493000 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.027575970 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.027606010 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.027632952 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.027653933 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.027689934 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.027729034 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.027741909 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.114506960 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.114573002 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.114648104 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.114703894 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.114970922 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.115108967 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.115176916 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.115255117 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.115474939 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.115552902 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.115881920 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.115948915 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.174792051 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.174853086 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.174916983 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.174967051 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.206656933 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.207770109 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.245146990 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.245316029 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.251425982 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.251528025 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.251646042 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.251745939 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.252021074 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.252074957 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.252114058 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.252130032 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.252171040 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.252187014 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.252223969 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.252243996 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.252274990 CET497504141192.168.2.4185.140.53.6
          Jan 24, 2022 02:24:39.252302885 CET414149750185.140.53.6192.168.2.4
          Jan 24, 2022 02:24:39.252331018 CET497504141192.168.2.4185.140.53.6
          TimestampSource PortDest PortSource IPDest IP
          Jan 24, 2022 02:24:20.130364895 CET5912353192.168.2.48.8.8.8
          Jan 24, 2022 02:24:20.152194977 CET53591238.8.8.8192.168.2.4
          Jan 24, 2022 02:24:26.604687929 CET5453153192.168.2.48.8.8.8
          Jan 24, 2022 02:24:26.623925924 CET53545318.8.8.8192.168.2.4
          Jan 24, 2022 02:24:31.216694117 CET4971453192.168.2.48.8.8.8
          Jan 24, 2022 02:24:31.236319065 CET53497148.8.8.8192.168.2.4
          Jan 24, 2022 02:24:37.260209084 CET5802853192.168.2.48.8.8.8
          Jan 24, 2022 02:24:37.283354044 CET53580288.8.8.8192.168.2.4
          Jan 24, 2022 02:24:43.306494951 CET5309753192.168.2.48.8.8.8
          Jan 24, 2022 02:24:43.325751066 CET53530978.8.8.8192.168.2.4
          Jan 24, 2022 02:24:50.347665071 CET6238953192.168.2.48.8.8.8
          Jan 24, 2022 02:24:50.367348909 CET53623898.8.8.8192.168.2.4
          Jan 24, 2022 02:24:56.356394053 CET4991053192.168.2.48.8.8.8
          Jan 24, 2022 02:24:56.376116037 CET53499108.8.8.8192.168.2.4
          Jan 24, 2022 02:25:02.409034967 CET5585453192.168.2.48.8.8.8
          Jan 24, 2022 02:25:02.430704117 CET53558548.8.8.8192.168.2.4
          Jan 24, 2022 02:25:08.887145996 CET6454953192.168.2.48.8.8.8
          Jan 24, 2022 02:25:08.907834053 CET53645498.8.8.8192.168.2.4
          Jan 24, 2022 02:25:14.852178097 CET6315353192.168.2.48.8.8.8
          Jan 24, 2022 02:25:14.871570110 CET53631538.8.8.8192.168.2.4
          Jan 24, 2022 02:25:20.936527014 CET5299153192.168.2.48.8.8.8
          Jan 24, 2022 02:25:20.955882072 CET53529918.8.8.8192.168.2.4
          Jan 24, 2022 02:25:27.008050919 CET5172653192.168.2.48.8.8.8
          Jan 24, 2022 02:25:27.027782917 CET53517268.8.8.8192.168.2.4
          Jan 24, 2022 02:25:33.414751053 CET5653453192.168.2.48.8.8.8
          Jan 24, 2022 02:25:33.435841084 CET53565348.8.8.8192.168.2.4
          Jan 24, 2022 02:25:39.569437981 CET5662753192.168.2.48.8.8.8
          Jan 24, 2022 02:25:39.586961031 CET53566278.8.8.8192.168.2.4
          Jan 24, 2022 02:25:45.674490929 CET5662153192.168.2.48.8.8.8
          Jan 24, 2022 02:25:45.694015980 CET53566218.8.8.8192.168.2.4
          Jan 24, 2022 02:25:51.681771994 CET6311653192.168.2.48.8.8.8
          Jan 24, 2022 02:25:51.704018116 CET53631168.8.8.8192.168.2.4
          Jan 24, 2022 02:25:57.978744984 CET5504653192.168.2.48.8.8.8
          Jan 24, 2022 02:25:57.998338938 CET53550468.8.8.8192.168.2.4
          Jan 24, 2022 02:26:04.045773983 CET5060153192.168.2.48.8.8.8
          Jan 24, 2022 02:26:04.066617966 CET53506018.8.8.8192.168.2.4
          Jan 24, 2022 02:26:10.198947906 CET6087553192.168.2.48.8.8.8
          Jan 24, 2022 02:26:10.220319033 CET53608758.8.8.8192.168.2.4
          Jan 24, 2022 02:26:16.618215084 CET5644853192.168.2.48.8.8.8
          Jan 24, 2022 02:26:16.639257908 CET53564488.8.8.8192.168.2.4
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
          Jan 24, 2022 02:24:20.130364895 CET192.168.2.48.8.8.80xf62eStandard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          Jan 24, 2022 02:24:26.604687929 CET192.168.2.48.8.8.80xcfe8Standard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          Jan 24, 2022 02:24:31.216694117 CET192.168.2.48.8.8.80xbee8Standard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          Jan 24, 2022 02:24:37.260209084 CET192.168.2.48.8.8.80x8d19Standard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          Jan 24, 2022 02:24:43.306494951 CET192.168.2.48.8.8.80xd83cStandard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          Jan 24, 2022 02:24:50.347665071 CET192.168.2.48.8.8.80x3947Standard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          Jan 24, 2022 02:24:56.356394053 CET192.168.2.48.8.8.80xd465Standard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          Jan 24, 2022 02:25:02.409034967 CET192.168.2.48.8.8.80x9325Standard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          Jan 24, 2022 02:25:08.887145996 CET192.168.2.48.8.8.80xc690Standard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          Jan 24, 2022 02:25:14.852178097 CET192.168.2.48.8.8.80xd813Standard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          Jan 24, 2022 02:25:20.936527014 CET192.168.2.48.8.8.80xa7baStandard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          Jan 24, 2022 02:25:27.008050919 CET192.168.2.48.8.8.80x6dd9Standard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          Jan 24, 2022 02:25:33.414751053 CET192.168.2.48.8.8.80xd584Standard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          Jan 24, 2022 02:25:39.569437981 CET192.168.2.48.8.8.80x3bcStandard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          Jan 24, 2022 02:25:45.674490929 CET192.168.2.48.8.8.80x5c16Standard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          Jan 24, 2022 02:25:51.681771994 CET192.168.2.48.8.8.80xe7efStandard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          Jan 24, 2022 02:25:57.978744984 CET192.168.2.48.8.8.80xf5f7Standard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          Jan 24, 2022 02:26:04.045773983 CET192.168.2.48.8.8.80x588dStandard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          Jan 24, 2022 02:26:10.198947906 CET192.168.2.48.8.8.80x7508Standard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          Jan 24, 2022 02:26:16.618215084 CET192.168.2.48.8.8.80x1c3aStandard query (0)onyeoma.ddns.netA (IP address)IN (0x0001)
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
          Jan 24, 2022 02:24:20.152194977 CET8.8.8.8192.168.2.40xf62eNo error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)
          Jan 24, 2022 02:24:26.623925924 CET8.8.8.8192.168.2.40xcfe8No error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)
          Jan 24, 2022 02:24:31.236319065 CET8.8.8.8192.168.2.40xbee8No error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)
          Jan 24, 2022 02:24:37.283354044 CET8.8.8.8192.168.2.40x8d19No error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)
          Jan 24, 2022 02:24:43.325751066 CET8.8.8.8192.168.2.40xd83cNo error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)
          Jan 24, 2022 02:24:50.367348909 CET8.8.8.8192.168.2.40x3947No error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)
          Jan 24, 2022 02:24:56.376116037 CET8.8.8.8192.168.2.40xd465No error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)
          Jan 24, 2022 02:25:02.430704117 CET8.8.8.8192.168.2.40x9325No error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)
          Jan 24, 2022 02:25:08.907834053 CET8.8.8.8192.168.2.40xc690No error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)
          Jan 24, 2022 02:25:14.871570110 CET8.8.8.8192.168.2.40xd813No error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)
          Jan 24, 2022 02:25:20.955882072 CET8.8.8.8192.168.2.40xa7baNo error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)
          Jan 24, 2022 02:25:27.027782917 CET8.8.8.8192.168.2.40x6dd9No error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)
          Jan 24, 2022 02:25:33.435841084 CET8.8.8.8192.168.2.40xd584No error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)
          Jan 24, 2022 02:25:39.586961031 CET8.8.8.8192.168.2.40x3bcNo error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)
          Jan 24, 2022 02:25:45.694015980 CET8.8.8.8192.168.2.40x5c16No error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)
          Jan 24, 2022 02:25:51.704018116 CET8.8.8.8192.168.2.40xe7efNo error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)
          Jan 24, 2022 02:25:57.998338938 CET8.8.8.8192.168.2.40xf5f7No error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)
          Jan 24, 2022 02:26:04.066617966 CET8.8.8.8192.168.2.40x588dNo error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)
          Jan 24, 2022 02:26:10.220319033 CET8.8.8.8192.168.2.40x7508No error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)
          Jan 24, 2022 02:26:16.639257908 CET8.8.8.8192.168.2.40x1c3aNo error (0)onyeoma.ddns.net185.140.53.6A (IP address)IN (0x0001)

          Click to jump to process

          Start time:02:24:10
          Start date:24/01/2022
          Path:C:\Users\user\Desktop\INQUIRY.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\INQUIRY.exe"
          Imagebase:0x400000
          File size:315125 bytes
          MD5 hash:DC0ACC75361BB39FBD4ABEC6EDC82CD5
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.665449354.00000000022E0000.00000004.00000001.sdmp, Author: Florian Roth
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.665449354.00000000022E0000.00000004.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.665449354.00000000022E0000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.665449354.00000000022E0000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          Reputation:low

          Start time:02:24:12
          Start date:24/01/2022
          Path:C:\Users\user\Desktop\INQUIRY.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\INQUIRY.exe"
          Imagebase:0x400000
          File size:315125 bytes
          MD5 hash:DC0ACC75361BB39FBD4ABEC6EDC82CD5
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000000.662575253.0000000000414000.00000040.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000000.662575253.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000002.00000000.662575253.0000000000414000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.918404744.0000000002522000.00000040.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.918404744.0000000002522000.00000040.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.918404744.0000000002522000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.917467270.0000000000774000.00000004.00000020.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.917467270.0000000000774000.00000004.00000020.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.917467270.0000000000774000.00000004.00000020.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.916471993.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.916471993.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.916471993.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.916471993.0000000000400000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000000.663644960.0000000000414000.00000040.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000000.663644960.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000002.00000000.663644960.0000000000414000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.918375056.00000000024E0000.00000004.00020000.sdmp, Author: Florian Roth
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.918375056.00000000024E0000.00000004.00020000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.918375056.00000000024E0000.00000004.00020000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.918375056.00000000024E0000.00000004.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.918797240.00000000039A2000.00000004.00000001.sdmp, Author: Joe Security
          Reputation:low

          Start time:02:24:23
          Start date:24/01/2022
          Path:C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe"
          Imagebase:0x400000
          File size:315125 bytes
          MD5 hash:DC0ACC75361BB39FBD4ABEC6EDC82CD5
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.704939952.0000000002300000.00000004.00000001.sdmp, Author: Florian Roth
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.704939952.0000000002300000.00000004.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.704939952.0000000002300000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.704939952.0000000002300000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          Antivirus matches:
          • Detection: 100%, Joe Sandbox ML
          Reputation:low

          Start time:02:24:29
          Start date:24/01/2022
          Path:C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe"
          Imagebase:0x400000
          File size:315125 bytes
          MD5 hash:DC0ACC75361BB39FBD4ABEC6EDC82CD5
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000001.703365040.0000000000400000.00000040.00020000.sdmp, Author: Florian Roth
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000001.703365040.0000000000400000.00000040.00020000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000001.703365040.0000000000400000.00000040.00020000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000004.00000001.703365040.0000000000400000.00000040.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.723024476.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.723024476.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.723024476.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.723024476.0000000000400000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.725072072.0000000002510000.00000004.00020000.sdmp, Author: Florian Roth
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.725072072.0000000002510000.00000004.00020000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.725072072.0000000002510000.00000004.00020000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.725072072.0000000002510000.00000004.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.725158787.00000000038D1000.00000004.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.725158787.00000000038D1000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.725158787.00000000038D1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.725196610.000000000390A000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.725196610.000000000390A000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.725133013.00000000028DE000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000000.701936247.0000000000414000.00000040.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000000.701936247.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000004.00000000.701936247.0000000000414000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.724570206.00000000006C5000.00000004.00000020.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.724570206.00000000006C5000.00000004.00000020.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.724570206.00000000006C5000.00000004.00000020.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000000.702725030.0000000000414000.00000040.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000000.702725030.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000004.00000000.702725030.0000000000414000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.725281266.00000000049D2000.00000040.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.725281266.00000000049D2000.00000040.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.725281266.00000000049D2000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          Reputation:low

          Start time:02:24:31
          Start date:24/01/2022
          Path:C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe"
          Imagebase:0x400000
          File size:315125 bytes
          MD5 hash:DC0ACC75361BB39FBD4ABEC6EDC82CD5
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.719731750.0000000002400000.00000004.00000001.sdmp, Author: Florian Roth
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.719731750.0000000002400000.00000004.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.719731750.0000000002400000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.719731750.0000000002400000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          Reputation:low

          Start time:02:24:37
          Start date:24/01/2022
          Path:C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\AppData\Roaming\sspgadrjncoy\rstmgknbahw.exe"
          Imagebase:0x400000
          File size:315125 bytes
          MD5 hash:DC0ACC75361BB39FBD4ABEC6EDC82CD5
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.735100285.0000000004940000.00000004.00020000.sdmp, Author: Florian Roth
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.735100285.0000000004940000.00000004.00020000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.735100285.0000000004940000.00000004.00020000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.735100285.0000000004940000.00000004.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000000.716081773.0000000000414000.00000040.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000000.716081773.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000006.00000000.716081773.0000000000414000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000001.718977051.0000000000414000.00000040.00020000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000001.718977051.0000000000414000.00000040.00020000.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000006.00000001.718977051.0000000000414000.00000040.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.734941801.00000000027AE000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.735022366.00000000037DA000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.735022366.00000000037DA000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.734234340.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.734234340.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.734234340.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.734234340.0000000000400000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.735138898.0000000004982000.00000040.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.735138898.0000000004982000.00000040.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.735138898.0000000004982000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.734386129.0000000000625000.00000004.00000020.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.734386129.0000000000625000.00000004.00000020.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.734386129.0000000000625000.00000004.00000020.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.734985665.00000000037A1000.00000004.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.734985665.00000000037A1000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.734985665.00000000037A1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000000.718272419.0000000000414000.00000040.00000001.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000000.718272419.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
          • Rule: NanoCore, Description: unknown, Source: 00000006.00000000.718272419.0000000000414000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
          Reputation:low

          No disassembly